Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Openvpn | Openvpn | 2.6.13 (including) | 2.6.13 (including) |
| Openvpn | Openvpn | 2.7-alpha1 (including) | 2.7-alpha1 (including) |
| Openvpn | Openvpn | 2.7-alpha2 (including) | 2.7-alpha2 (including) |
| Openvpn | Openvpn | 2.7-alpha3 (including) | 2.7-alpha3 (including) |
| Openvpn | Openvpn | 2.7-beta1 (including) | 2.7-beta1 (including) |
| Openvpn | Openvpn | 2.7-beta2 (including) | 2.7-beta2 (including) |
| Openvpn | Openvpn | 2.7-beta3 (including) | 2.7-beta3 (including) |
| Openvpn | Openvpn | 2.7-rc1 (including) | 2.7-rc1 (including) |