CVE-2024-28882
Ubuntu Security Notice USN-6860-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session
OpenVPN 2.6.10 y versiones anteriores en una función de servidor aceptan múltiples notificaciones de salida de clientes autenticados que extenderán la validez de una sesión de cierre
Reynir Bjoernsson discovered that OpenVPN incorrectly handled terminating client connections. A remote authenticated client could possibly use this issue to keep the connection active, bypassing certain security policies. This issue only affected Ubuntu 23.10, and Ubuntu 24.04 LTS. Reynir Bjoernsson discovered that OpenVPN incorrectly handled certain control channel messages with nonprintable characters. A remote attacker could possibly use this issue to cause OpenVPN to consume resources, or fill up log files with garbage, leading to a denial of service.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-03-12 CVE Reserved
- 2024-07-03 CVE Published
- 2024-11-01 CVE Updated
- 2025-04-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-772: Missing Release of Resource after Effective Lifetime
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://community.openvpn.net/openvpn/wiki/CVE-2024-28882 | ||
https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
OpenVPN Search vendor "OpenVPN" | OpenVPN Search vendor "OpenVPN" for product "OpenVPN" | >= 2.6.0 <= 2.6.10 Search vendor "OpenVPN" for product "OpenVPN" and version " >= 2.6.0 <= 2.6.10" | en |
Affected
|