CVE-2024-28820

Buffer overflow in the extract_openvpn_cr function in openvpn-cr.c in openvpn-auth-ldap (aka the Three Rings Auth-LDAP plugin for OpenVPN) 2.0.4 allows attackers with a valid LDAP username and who can control the challenge/response password field to pass a string with more than 14 colons into this field and cause a buffer overflow.
Configurations

No configuration.

History

21 Nov 2024, 09:06

Type Values Removed Values Added
References () https://github.com/threerings/openvpn-auth-ldap/pull/92 - () https://github.com/threerings/openvpn-auth-ldap/pull/92 -
References () https://github.com/threerings/openvpn-auth-ldap/tags - () https://github.com/threerings/openvpn-auth-ldap/tags -

04 Nov 2024, 18:35

Type Values Removed Values Added
CWE CWE-125

25 Oct 2024, 18:35

Type Values Removed Values Added
CWE CWE-121

03 Jul 2024, 01:51

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3
CWE CWE-121
Summary
  • (es) Desbordamiento de búfer en la función extract_openvpn_cr en openvpn-cr.c en openvpn-auth-ldap (también conocido como el complemento Three Rings Auth-LDAP para OpenVPN) 2.0.4 permite a atacantes con un nombre de usuario LDAP válido y que pueden controlar el campo de contraseña de desafío/respuesta pasar una cadena con más de 14 dos puntos a este campo y provocar un desbordamiento del búfer.

27 Jun 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-27 16:15

Updated : 2024-11-21 09:06


NVD link : CVE-2024-28820

Mitre link : CVE-2024-28820

CVE.ORG link : CVE-2024-28820


JSON object : View

Products Affected

No product.

CWE
CWE-125

Out-of-bounds Read