First published: Fri Dec 07 2007(Updated: )
Multiple format string vulnerabilities in the configuration file in SonicWALL GLobal VPN Client 3.1.556 and 4.0.0.810 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in the (1) Hostname tag or the (2) name attribute in the Connection tag. NOTE: there might not be any realistic circumstances in which this issue crosses privilege boundaries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sonicwall Global Vpn Client | =3.1.556 | |
Sonicwall Global Vpn Client | =4.0.0.810 | |
SonicWALL GLobal VPN Client | =3.1.556 | |
SonicWALL GLobal VPN Client | =4.0.0.810 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.