First published: Tue Apr 12 2016(Updated: )
Buffer overflow in the GlobalProtect Portal in Palo Alto Networks PAN-OS before 5.0.18, 6.0.x before 6.0.13, 6.1.x before 6.1.10, and 7.0.x before 7.0.5 allows remote attackers to cause a denial of service (device crash) or possibly execute arbitrary code via an SSL VPN request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=5.0.0<5.0.18 | |
Palo Alto Networks PAN-OS | >=5.1<5.1.11 | |
Palo Alto Networks PAN-OS | >=6.0.0<6.0.13 | |
Palo Alto Networks PAN-OS | >=6.1.0<6.1.10 | |
Palo Alto Networks PAN-OS | >=7.0.0<=7.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3657 is considered a high severity vulnerability due to its potential to cause a denial of service or execute arbitrary code.
To fix CVE-2016-3657, upgrade your Palo Alto Networks PAN-OS to a version that is later than 5.0.18, 6.0.13, 6.1.10, or 7.0.5.
CVE-2016-3657 can lead to device crashes or allow attackers to execute arbitrary code on affected systems.
Affected versions include PAN-OS versions before 5.0.18, 6.0.x before 6.0.13, 6.1.x before 6.1.10, and 7.0.x before 7.0.5.
CVE-2016-3657 is a buffer overflow vulnerability specifically in the GlobalProtect Portal component of Palo Alto Networks PAN-OS.