Buffer Overflow in SonicWALL SSL-VPN Product by SonicWALL
CVE-2010-2583

Currently unrated

Key Information:

Vendor
Sonicwall
Vendor
CVE Published:
3 November 2010

Summary

The SonicWALL SSL-VPN End-Point Interrogator/Installer contains a stack-based buffer overflow vulnerability in its ActiveX control. This flaw allows remote attackers to execute arbitrary code when they use excessively long parameters in the Install3rdPartyComponent method, particularly in the CabURL and Location arguments. Affected versions prior to 10.5.2 and pre-10.0.5 hotfix 3 are susceptible to this attack, posing significant risks for users who have not applied the necessary updates. Security measures should be implemented immediately to safeguard your network.

References

EPSS Score

6% chance of being exploited in the next 30 days.

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.