check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 22 Aug 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openvpn
Openvpn tap-windows6 |
|
| CPEs | cpe:2.3:a:openvpn:tap-windows6:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openvpn
Openvpn tap-windows6 |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: OpenVPN
Published:
Updated: 2024-08-23T03:55:36.778Z
Reserved: 2024-02-07T13:22:25.493Z
Link: CVE-2024-1305
Updated: 2024-08-01T18:33:25.379Z
Status : Analyzed
Published: 2024-07-08T18:15:07.150
Modified: 2025-08-22T15:36:38.907
Link: CVE-2024-1305
No data.
OpenCVE Enrichment
No data.