First published: Wed Oct 04 2017(Updated: )
Last updated 11 March 2025
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Monitor | <2.3.18 | |
OpenVPN Monitor | >=2.4.0<2.4.4 | |
Debian Linux | =9.0 | |
debian/openvpn | 2.5.1-3 2.5.1-3+deb11u1 2.6.3-1+deb12u2 2.6.13-1 2.6.14-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12166 is classified as a high severity vulnerability due to the potential for code execution resulting from a buffer overflow.
To mitigate CVE-2017-12166, upgrade OpenVPN to version 2.3.3 or later, or 2.4.4 or later.
CVE-2017-12166 affects OpenVPN versions prior to 2.3.3 and versions in the 2.4.x range before 2.4.4.
CVE-2017-12166 is caused by a buffer overflow vulnerability that occurs when using key-method 1 in OpenVPN.
Yes, CVE-2017-12166 can be exploited remotely, allowing an attacker to execute arbitrary code.