CVE-2024-1305

tap-windows6 driver version 9.26 and earlier does not properly check the size data of incomming write operations which an attacker can use to overflow memory buffers, resulting in a bug check and potentially arbitrary code execution in kernel space
Configurations

Configuration 1 (hide)

cpe:2.3:a:openvpn:tap-windows6:*:*:*:*:*:*:*:*

History

22 Aug 2025, 15:36

Type Values Removed Values Added
CPE cpe:2.3:a:openvpn:tap-windows6:*:*:*:*:*:*:*:*
First Time Openvpn
Openvpn tap-windows6
References () https://community.openvpn.net/openvpn/wiki/CVE-2024-1305 - () https://community.openvpn.net/openvpn/wiki/CVE-2024-1305 - Vendor Advisory
References () https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html - () https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html - Release Notes, Mailing List

Information

Published : 2024-07-08 18:15

Updated : 2025-08-22 15:36


NVD link : CVE-2024-1305

Mitre link : CVE-2024-1305

CVE.ORG link : CVE-2024-1305


JSON object : View

Products Affected

openvpn

  • tap-windows6
CWE
CWE-190

Integer Overflow or Wraparound