tap-windows6 driver version 9.26 and earlier does not properly
check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
References
Link | Resource |
---|---|
https://community.openvpn.net/openvpn/wiki/CVE-2024-1305 | Vendor Advisory |
https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html | Release Notes Mailing List |
https://community.openvpn.net/openvpn/wiki/CVE-2024-1305 | Vendor Advisory |
https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html | Release Notes Mailing List |
Configurations
History
22 Aug 2025, 15:36
Type | Values Removed | Values Added |
---|---|---|
First Time |
Openvpn tap-windows6
Openvpn |
|
CPE | cpe:2.3:a:openvpn:tap-windows6:*:*:*:*:*:*:*:* | |
References | () https://community.openvpn.net/openvpn/wiki/CVE-2024-1305 - Vendor Advisory | |
References | () https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html - Release Notes, Mailing List |
21 Nov 2024, 08:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.openvpn.net/openvpn/wiki/CVE-2024-1305 - | |
References | () https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html - |
09 Jul 2024, 16:22
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
08 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-08 18:15
Updated : 2025-08-22 15:36
NVD link : CVE-2024-1305
Mitre link : CVE-2024-1305
CVE.ORG link : CVE-2024-1305
JSON object : View
Products Affected
openvpn
- tap-windows6
CWE
CWE-190
Integer Overflow or Wraparound