tap-windows6 driver version 9.26 and earlier does not properly check the size data of incomming write operations which an attacker can use to overflow memory buffers, resulting in a bug check and potentially arbitrary code execution in kernel spaceReferenceshttps://community.openvpn.net/openvpn/wiki/CVE-2024-1305https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html