Stack Overflow Vulnerability in OpenVPN Allows Arbitrary Code Execution
CVE-2024-27459
7.8HIGH
Summary
The interactive service component of OpenVPN versions 2.6.9 and earlier is susceptible to a stack overflow vulnerability. This flaw enables attackers to send specially crafted data to the service, resulting in a stack overflow condition. Exploiting this vulnerability may allow the execution of arbitrary code, leading to elevated privileges on the affected system. Users of OpenVPN are encouraged to review their usage of the software and apply necessary security measures to mitigate potential risks.
Affected Version(s)
OpenVPN GUI Windows 2.6.9 and earlier
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- 📰
First article discovered by Microsoft
Vulnerability published
Vulnerability Reserved