Description
Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder.
Exploits (1)
References (7)
Core 7
Core References
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/34037
Exploit x_refsource_misc
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php
Exploit x_refsource_misc
http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html
Third Party Advisory vendor-advisory
x_refsource_hp
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05325943
Broken Link vdb-entry
x_refsource_osvdb
http://osvdb.org/show/osvdb/109007
Patch x_refsource_misc
https://github.com/CVEProject/cvelist/pull/3909/commits/ace34f1cf94602f31760d3eb7ae68e17df8f914d
Issue Tracking x_refsource_misc
https://github.com/CVEProject/cvelist/pull/3909
Scores
EPSS
0.0058
EPSS Percentile
69.1%
Details
CWE
CWE-428
Status
published
Products (2)
openvpn/openvpn
2.1.28.0
privatetunnel/privatetunnel
2.3.8
Published
Aug 25, 2014
Tracked Since
Feb 18, 2026