First published: Thu Jun 20 2024(Updated: )
Stack-based buffer overflow vulnerability in the SonicOS HTTP server allows an authenticated remote attacker to cause Denial of Service (DoS) via sscanf function.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
SonicWall SonicOS | <7.0.1-5161 | |
SonicWall SonicOS | >=7.1.1<7.1.1-7058 | |
SonicWall SonicOS | >=7.1.2<7.1.2-7019 | |
Any of | ||
Sonicwall Nsa 2700 | ||
Sonicwall Nsa 3700 | ||
Sonicwall Nsa 4700 | ||
Sonicwall Nsa 5700 | ||
Sonicwall Nsa 6700 | ||
Sonicwall Nssp 10700 | ||
Sonicwall Nssp 11700 | ||
Sonicwall Nssp 13700 | ||
Sonicwall Nsv 270 | ||
Sonicwall Nsv 470 | ||
Sonicwall Nsv 870 | ||
Sonicwall Tz270 | ||
Sonicwall Tz270w | ||
Sonicwall Tz370 | ||
Sonicwall Tz370w | ||
Sonicwall Tz470 | ||
Sonicwall Tz470w | ||
Sonicwall Tz570 | ||
Sonicwall Tz570p | ||
Sonicwall Tz570w | ||
Sonicwall Tz670 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29012 is classified as a high severity vulnerability due to its potential to cause Denial of Service (DoS) attacks.
To fix CVE-2024-29012, you should update your SonicOS to the latest available version beyond 7.0.1-5161, 7.1.1-7058, or 7.1.2-7019.
CVE-2024-29012 affects specific versions of SonicWall SonicOS prior to 7.0.1-5161 and certain ranges of versions 7.1.1 and 7.1.2.
CVE-2024-29012 is a stack-based buffer overflow vulnerability found in the SonicOS HTTP server.
Yes, CVE-2024-29012 can be exploited by an authenticated remote attacker.