First published: Mon Jul 08 2024(Updated: )
The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.
Credit: security@openvpn.net
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Monitor | <2.5.10 | |
OpenVPN Monitor | >=2.6.0<2.6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27459 has a critical severity rating due to the potential for remote code execution with elevated privileges.
To mitigate CVE-2024-27459, update OpenVPN to version 2.6.10 or later if you are using version 2.6.9 or earlier.
CVE-2024-27459 affects OpenVPN versions up to and including 2.6.9 and any version in the range from 2.6.0 to 2.6.9.
CVE-2024-27459 allows an attacker to exploit a stack overflow vulnerability to execute arbitrary code.
Currently, the recommended resolution for CVE-2024-27459 is to upgrade to a patched version, as no specific workaround is provided.