OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.
References
Link | Resource |
---|---|
https://community.openvpn.net/openvpn/wiki/CVE-2024-5594 | Vendor Advisory |
https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html | Release Notes |
Configurations
History
10 Jun 2025, 16:26
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:* | |
References | () https://community.openvpn.net/openvpn/wiki/CVE-2024-5594 - Vendor Advisory | |
References | () https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html - Release Notes | |
First Time |
Openvpn openvpn
Openvpn |
02 Apr 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs. |
06 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
06 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-06 14:15
Updated : 2025-06-10 16:26
NVD link : CVE-2024-5594
Mitre link : CVE-2024-5594
CVE.ORG link : CVE-2024-5594
JSON object : View
Products Affected
openvpn
- openvpn
CWE
CWE-1287
Improper Validation of Specified Type of Input