Lucene search

K
exploitdbSEC ConsultEDB-ID:30840
HistoryDec 04, 2007 - 12:00 a.m.

SonicWALL Global VPN Client 4.0.782 - Remote Format String

2007-12-0400:00:00
SEC Consult
www.exploit-db.com
22

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/26689/info

SonicWALL Global VPN Client is prone to a remote format-string vulnerability because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function.

Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the application. Failed attempts may cause denial-of-service conditions.

Versions prior to SonicWALL Global VPN Client 4.0.0.830 are affected. 

The following proof of concept was supplied:
<Connection name=> AAAAAAAAAA%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%
x.%x
<HostName> BBBBBBBBBB%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%
x.%x.%x.%x.%x.%x.%x 

AI Score

7.4

Confidence

Low