tap-windows6 driver version 9.26 and earlier does not properly
check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
References
Configurations
No configuration.
History
21 Nov 2024, 08:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.openvpn.net/openvpn/wiki/CVE-2024-1305 - | |
References | () https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html - |
09 Jul 2024, 16:22
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
08 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-08 18:15
Updated : 2024-11-21 08:50
NVD link : CVE-2024-1305
Mitre link : CVE-2024-1305
CVE.ORG link : CVE-2024-1305
JSON object : View
Products Affected
No product.
CWE
CWE-190
Integer Overflow or Wraparound