ID CVE-2017-12166
Summary OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.
References
Vulnerable Configurations
  • cpe:2.3:a:openvpn:openvpn:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:2.4.0:-:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.0:-:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:2.4.0:alpha1:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.0:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:2.4.0:alpha2:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.0:alpha2:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:2.4.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:2.4.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:2.4.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:2.4.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*
    cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 12-05-2022 - 20:10)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 101153
misc https://community.openvpn.net/openvpn/wiki/CVE-2017-12166
sectrack 1039470
Last major update 12-05-2022 - 20:10
Published 04-10-2017 - 01:29
Last modified 12-05-2022 - 20:10
Back to Top