{"id":"CVE-2023-46850","details":"Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.","modified":"2026-03-14T14:54:47.574425Z","published":"2023-11-11T01:15:07.357Z","related":["USN-6484-1","openSUSE-SU-2024:13429-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/"},{"type":"ADVISORY","url":"https://community.openvpn.net/openvpn/wiki/CVE-2023-46850"},{"type":"ADVISORY","url":"https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5555"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openvpn/openvpn","events":[{"introduced":"b999466418dddb89721be5455f03bacd9b221b1d"},{"last_affected":"c9540130121bfc21902a54c8e4c9bc1108695068"}],"database_specific":{"versions":[{"introduced":"2.6.0"},{"last_affected":"2.6.6"}]}}],"versions":["v2.6.0","v2.6.1","v2.6.2","v2.6.3","v2.6.4","v2.6.5","v2.6.6"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"2.11.0"},{"last_affected":"2.11.3"}]},{"events":[{"introduced":"2.12.0"},{"fixed":"2.12.2"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]},{"events":[{"introduced":"0"},{"last_affected":"39"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46850.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}