2023-11-11 03:00:24 +00:00
{
"id" : "CVE-2023-46850" ,
"sourceIdentifier" : "security@openvpn.net" ,
"published" : "2023-11-11T01:15:07.357" ,
2023-11-13 05:00:24 +00:00
"lastModified" : "2023-11-13T03:16:20.870" ,
"vulnStatus" : "Awaiting Analysis" ,
2023-11-11 03:00:24 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer."
}
] ,
"metrics" : { } ,
"weaknesses" : [
{
"source" : "security@openvpn.net" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-416"
}
]
}
] ,
"references" : [
{
"url" : "https://community.openvpn.net/openvpn/wiki/CVE-2023-46850" ,
"source" : "security@openvpn.net"
} ,
{
"url" : "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/" ,
"source" : "security@openvpn.net"
}
]
}