Severity
9.8CRITICALNVD
EPSS
1.0%
top 23.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4
Latest updateMar 11

Description

OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

debiandebian/openvpn< openvpn 2.4.4-1 (bookworm)
NVDopenvpn/openvpn2.4.02.4.4+1
Debianopenvpn/openvpn< 2.4.4-1+3
Ubuntuopenvpn/openvpn< 2.3.2-7ubuntu3.2+esm2+2

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

3
OSV
openvpn vulnerabilities2025-03-11
GHSA
GHSA-vffw-rxx6-r4pj: OpenVPN versions before 22022-05-04
OSV
CVE-2017-12166: OpenVPN versions before 22017-10-04

📋Vendor Advisories

2
Ubuntu
OpenVPN vulnerabilities2025-03-11
Debian
CVE-2017-12166: openvpn - OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer ...2017

💬Community

3
Bugzilla
CVE-2017-12166 openvpn: Incorrect bounds check in read_key() with 'key-method 1' [fedora-all]2017-09-29
Bugzilla
CVE-2017-12166 openvpn: Incorrect bounds check in read_key() with 'key-method 1'2017-09-29
Bugzilla
CVE-2017-12166 openvpn: Incorrect bounds check in read_key() with 'key-method 1' [epel-all]2017-09-29
CVE-2017-12166 — Out-of-bounds Write in Openvpn | cvebase