Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.
History

Thu, 05 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall sma100 Firmware
CPEs cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sonicwall
Sonicwall sma100 Firmware
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Dec 2024 13:45:00 +0000

Type Values Removed Values Added
Description Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.
Weaknesses CWE-122
References

cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published: 2024-12-05T13:39:19.644Z

Updated: 2024-12-07T04:55:28.515Z

Reserved: 2024-07-10T15:58:49.461Z

Link: CVE-2024-40763

cve-icon Vulnrichment

Updated: 2024-12-05T16:51:54.353Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-05T14:15:20.850

Modified: 2024-12-05T17:15:11.720

Link: CVE-2024-40763

cve-icon Redhat

No data.