CVE-2024-5594

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*

History

10 Jun 2025, 16:26

Type Values Removed Values Added
CPE cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*
References () https://community.openvpn.net/openvpn/wiki/CVE-2024-5594 - () https://community.openvpn.net/openvpn/wiki/CVE-2024-5594 - Vendor Advisory
References () https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html - () https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html - Release Notes
First Time Openvpn openvpn
Openvpn

02 Apr 2025, 21:15

Type Values Removed Values Added
Summary
  • (es) OpenVPN anterior a 2.6.11 no desinfecta adecuadamente los mensajes PUSH_REPLY, lo cual los atacantes pueden usar para inyectar datos arbitrarios inesperados en ejecutables o complementos de terceros.
Summary (en) OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins. (en) OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.

06 Jan 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

06 Jan 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-06 14:15

Updated : 2025-06-10 16:26


NVD link : CVE-2024-5594

Mitre link : CVE-2024-5594

CVE.ORG link : CVE-2024-5594


JSON object : View

Products Affected

openvpn

  • openvpn
CWE
CWE-1287

Improper Validation of Specified Type of Input