Insufficient argument validation in OpenVPN 2.7alpha1 through 2.7rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "2.6.13"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-alpha1"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-alpha2"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-alpha3"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-beta3"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-rc1"
}
]
}