First published: Wed Nov 03 2010(Updated: )
Stack-based buffer overflow in SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX control (Aventail.EPInstaller) before 10.5.2 and 10.0.5 hotfix 3 allows remote attackers to execute arbitrary code via long (1) CabURL and (2) Location arguments to the Install3rdPartyComponent method.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sonicwall Ssl-vpn End-point Interrogator\/installer Activex Control | <=10.5.1 | |
Sonicwall Ssl-vpn End-point Interrogator\/installer Activex Control | =10.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2583 has a critical severity rating due to the potential for remote code execution.
To fix CVE-2010-2583, upgrade the SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX control to version 10.5.2 or later.
CVE-2010-2583 affects SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX control versions prior to 10.5.2 and version 10.0.5.
Systems running SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX control versions 10.5.1 and 10.0.5 are vulnerable to CVE-2010-2583.
Yes, CVE-2010-2583 can be exploited remotely by attackers through crafted arguments sent to the Install3rdPartyComponent method.