tap-windows6 driver version 9.26 and earlier does not properly
check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
References
Link | Resource |
---|---|
https://community.openvpn.net/openvpn/wiki/CVE-2024-1305 | Vendor Advisory |
https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html | Release Notes Mailing List |
https://community.openvpn.net/openvpn/wiki/CVE-2024-1305 | Vendor Advisory |
https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html | Release Notes Mailing List |
Configurations
History
22 Aug 2025, 15:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:openvpn:tap-windows6:*:*:*:*:*:*:*:* | |
First Time |
Openvpn
Openvpn tap-windows6 |
|
References | () https://community.openvpn.net/openvpn/wiki/CVE-2024-1305 - Vendor Advisory | |
References | () https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html - Release Notes, Mailing List |
Information
Published : 2024-07-08 18:15
Updated : 2025-08-22 15:36
NVD link : CVE-2024-1305
Mitre link : CVE-2024-1305
CVE.ORG link : CVE-2024-1305
JSON object : View
Products Affected
openvpn
- tap-windows6
CWE
CWE-190
Integer Overflow or Wraparound