First published: Wed Oct 04 2017(Updated: )
OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Monitor | <2.3.18 | |
OpenVPN Monitor | >=2.4.0<2.4.4 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12166 is classified as a high severity vulnerability due to the potential for code execution resulting from a buffer overflow.
To mitigate CVE-2017-12166, upgrade OpenVPN to version 2.3.3 or later, or 2.4.4 or later.
CVE-2017-12166 affects OpenVPN versions prior to 2.3.3 and versions in the 2.4.x range before 2.4.4.
CVE-2017-12166 is caused by a buffer overflow vulnerability that occurs when using key-method 1 in OpenVPN.
Yes, CVE-2017-12166 can be exploited remotely, allowing an attacker to execute arbitrary code.