tap-windows6 driver version 9.26 and earlier does not properly
check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: OpenVPN
Published: 2024-07-08T17:27:44.097Z
Updated: 2024-08-23T03:55:36.778Z
Reserved: 2024-02-07T13:22:25.493Z
Link: CVE-2024-1305
Vulnrichment
Updated: 2024-08-01T18:33:25.379Z
NVD
Status : Awaiting Analysis
Published: 2024-07-08T18:15:07.150
Modified: 2024-07-09T18:19:14.047
Link: CVE-2024-1305
Redhat
No data.