tap-windows6 driver version 9.26 and earlier does not properly
check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 22 Aug 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openvpn
Openvpn tap-windows6 |
|
| CPEs | cpe:2.3:a:openvpn:tap-windows6:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openvpn
Openvpn tap-windows6 |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: OpenVPN
Published:
Updated: 2024-08-23T03:55:36.778Z
Reserved: 2024-02-07T13:22:25.493Z
Link: CVE-2024-1305
Updated: 2024-08-01T18:33:25.379Z
Status : Analyzed
Published: 2024-07-08T18:15:07.150
Modified: 2025-08-22T15:36:38.907
Link: CVE-2024-1305
No data.
OpenCVE Enrichment
No data.
Weaknesses