A heap-based buffer overflow vulnerability exists in the vpnserver WpcParsePacket() functionality of SoftEther VPN 4.41-9782-beta, 5.01.9674 and 5.02. A specially crafted network packet can lead to arbitrary code execution. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1735 | Exploit Third Party Advisory |
https://www.softether.org/9-about/News/904-SEVPN202301 | Patch Vendor Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1735 | Exploit Third Party Advisory |
https://www.softether.org/9-about/News/904-SEVPN202301 | Patch Vendor Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1735 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-12 16:15
Updated : 2024-11-21 07:52
NVD link : CVE-2023-27395
Mitre link : CVE-2023-27395
CVE.ORG link : CVE-2023-27395
JSON object : View
Products Affected
softether
- vpn