First published: Fri Dec 07 2007(Updated: )
Multiple format string vulnerabilities in the configuration file in SonicWALL GLobal VPN Client 3.1.556 and 4.0.0.810 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in the (1) Hostname tag or the (2) name attribute in the Connection tag. NOTE: there might not be any realistic circumstances in which this issue crosses privilege boundaries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sonicwall Global Vpn Client | =3.1.556 | |
Sonicwall Global Vpn Client | =4.0.0.810 | |
SonicWALL GLobal VPN Client | =3.1.556 | |
SonicWALL GLobal VPN Client | =4.0.0.810 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6273 has a medium severity rating due to its ability to allow remote code execution through user-assisted attacks.
To fix CVE-2007-6273, you should update the SonicWALL Global VPN Client to the latest version that patches this vulnerability.
CVE-2007-6273 affects users of SonicWALL Global VPN Client versions 3.1.556 and 4.0.0.810.
The vulnerability in CVE-2007-6273 is caused by multiple format string vulnerabilities in the configuration file of the SonicWALL Global VPN Client.
Yes, CVE-2007-6273 can be exploited remotely, but it requires user assistance to trigger the execution of arbitrary code.