GCVE-VVD-MAGEIA-2017-372
Advisory Published
Vulnetix · Advisory published October 18, 2017
The bounds check in read_key() was performed after using the value, instead of before. If 'key-method 1' is used, this allowed an attacker to send a malformed packet to trigger a stack buffer overflow. Note that 'key-method 1' has been replaced by 'key method 2' as the default in OpenVPN 2.0 (CVE-2017-12166).

Affected Products

VendorProductVersionsPlatforms
Mageiaopenvpn0 (affected), 2.4.4-1.mga6 (unaffected)
Mageiaopenvpn0 (affected), 2.3.18-1.mga5 (unaffected)

References

Browse GCVE Records

100 records in the GCVE database · Updated April 16, 2026

No matching records found.

Explore Further

Investigate this vulnerability in the interactive console or download the raw GCVE record.