First published: Tue May 01 2018(Updated: )
openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openvpn Openvpn | >=2.4.0<2.4.6 | |
Slackware Slackware Linux | =13.0 | |
Slackware Slackware Linux | =13.1 | |
Slackware Slackware Linux | =13.37 | |
Slackware Slackware Linux | =14.0 | |
Slackware Slackware Linux | =14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9336 is a vulnerability in OpenVPN 2.4.x before 2.4.6 that allows a local attacker to cause a double-free of memory, potentially leading to denial-of-service or other impacts.
CVE-2018-9336 has a severity rating of 7.8 (High).
OpenVPN 2.4.x before 2.4.6 and Slackware Linux versions 13.0, 13.1, 13.37, 14.0, and 14.1 are affected by CVE-2018-9336.
To fix CVE-2018-9336, users should upgrade to OpenVPN version 2.4.6 or later.
More information about CVE-2018-9336 can be found at the following references: Slackware Security Advisory, OpenVPN Wiki, and OpenVPN GitHub commit.