Buffer Overflow in SonicWALL SSL-VPN Product by SonicWALL
CVE-2010-2583
Currently unrated
Key Information:
- Vendor
- Sonicwall
- Vendor
- CVE Published:
- 3 November 2010
Summary
The SonicWALL SSL-VPN End-Point Interrogator/Installer contains a stack-based buffer overflow vulnerability in its ActiveX control. This flaw allows remote attackers to execute arbitrary code when they use excessively long parameters in the Install3rdPartyComponent method, particularly in the CabURL and Location arguments. Affected versions prior to 10.5.2 and pre-10.0.5 hotfix 3 are susceptible to this attack, posing significant risks for users who have not applied the necessary updates. Security measures should be implemented immediately to safeguard your network.
References
EPSS Score
6% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved