CVE-2024-28820

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28820
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28820.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-28820
Related
Published
2024-06-27T16:15:10Z
Modified
2024-09-18T03:26:12.031864Z
Summary
[none]
Details

Buffer overflow in the extractopenvpncr function in openvpn-cr.c in openvpn-auth-ldap (aka the Three Rings Auth-LDAP plugin for OpenVPN) 2.0.4 allows attackers with a valid LDAP username and who can control the challenge/response password field to pass a string with more than 14 colons into this field and cause a buffer overflow.

References

Affected packages

Debian:11 / openvpn-auth-ldap

Package

Name
openvpn-auth-ldap
Purl
pkg:deb/debian/openvpn-auth-ldap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.0.4-1
2.0.4-2
2.0.4-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / openvpn-auth-ldap

Package

Name
openvpn-auth-ldap
Purl
pkg:deb/debian/openvpn-auth-ldap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.0.4-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}