First published: Wed Oct 28 2020(Updated: )
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to perform buffer overflow.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pulsesecure Pulse Secure Desktop Client | <9.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r2 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r3 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r3.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r4 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r4.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r4.2 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r5 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r6 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r7 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r7.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r8 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-8249.
The title of the vulnerability is 'A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to perform buffer overflow.'
The severity of CVE-2020-8249 is high with a CVSS score of 7.8.
The Pulse Secure Desktop Client (Linux) versions < 9.1R9 are affected by CVE-2020-8249.
Attackers can exploit the vulnerability by performing a buffer overflow attack.