Use after free vulnerability in OpenVPN - CVE-2023-46850ID: oval:org.secpod.oval:def:94766 | Date: (C)2023-11-27 (M)2023-12-11 |
Class: VULNERABILITY | Family: windows |
The host is installed with OpenVPN 2.6.x through 2.6.6 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle a send buffer after it has been free()d in some circumstances. Successful exploitation could allow attackers to lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.
Platform: |
Microsoft Windows 11 |
Microsoft Windows Server 2022 |
Microsoft Windows 10 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |