![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2023-46850 |
Description: | Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer. |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-46850 Debian Security Information: DSA-5555 (Google Search) https://www.debian.org/security/2023/dsa-5555 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/ https://community.openvpn.net/openvpn/wiki/CVE-2023-46850 https://community.openvpn.net/openvpn/wiki/CVE-2023-46850 https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/ https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/ |