First published: Thu Jun 20 2024(Updated: )
Heap-based buffer overflow vulnerability in the SonicOS SSL-VPN allows an authenticated remote attacker to cause Denial of Service (DoS) via memcpy function.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
SonicWall SonicOS | <7.0.1-5161 | |
SonicWall SonicOS | >=7.1.1<7.1.1-7058 | |
SonicWall SonicOS | >=7.1.2<7.1.2-7019 | |
Any of | ||
Sonicwall Nsa 2700 | ||
Sonicwall Nsa 3700 | ||
Sonicwall Nsa 4700 | ||
Sonicwall Nsa 5700 | ||
Sonicwall Nsa 6700 | ||
Sonicwall Nssp 10700 | ||
Sonicwall Nssp 11700 | ||
Sonicwall Nssp 13700 | ||
Sonicwall Nsv 270 | ||
Sonicwall Nsv 470 | ||
Sonicwall Nsv 870 | ||
Sonicwall Tz270 | ||
Sonicwall Tz270w | ||
Sonicwall Tz370 | ||
Sonicwall Tz370w | ||
Sonicwall Tz470 | ||
Sonicwall Tz470w | ||
Sonicwall Tz570 | ||
Sonicwall Tz570p | ||
Sonicwall Tz570w | ||
Sonicwall Tz670 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29013 is classified as a high severity vulnerability due to its potential to cause Denial of Service (DoS) attacks.
To fix CVE-2024-29013, update SonicOS to the latest version, specifically beyond 7.0.1-5161.
CVE-2024-29013 is a heap-based buffer overflow vulnerability.
CVE-2024-29013 affects authorized users of specific versions of SonicWall SonicOS.
An attacker exploiting CVE-2024-29013 can cause a Denial of Service (DoS) by leveraging the vulnerability in the memcpy function.