CVE-2017-12166
Summary
| CVE | CVE-2017-12166 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-10-04 01:29:00 UTC |
| Updated | 2022-05-12 20:10:00 UTC |
| Description | OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| CVE-2017-12166 – OpenVPN Community |
MISC |
community.openvpn.net |
Vendor Advisory |
| [SECURITY] [DLA 2992-1] openvpn security update |
MLIST |
lists.debian.org |
|
| OpenVPN 'read_key()' Function Stack Buffer Overflow Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| OpenVPN Buffer Overflow When Using 'Key Method 1' Lets Remote Users Execute Arbitrary Code - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 179259 Debian Security Update for Open Virtual Private Network (OpenVPN) (DLA 2992-1)