Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sonicwall
Sonicwall sma100 Firmware |
|
CPEs | cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Sonicwall
Sonicwall sma100 Firmware |
|
Metrics |
cvssV3_1
|
Thu, 05 Dec 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution. | |
Weaknesses | CWE-122 | |
References |
|
MITRE
Status: PUBLISHED
Assigner: sonicwall
Published: 2024-12-05T13:39:19.644Z
Updated: 2024-12-07T04:55:28.515Z
Reserved: 2024-07-10T15:58:49.461Z
Link: CVE-2024-40763
Vulnrichment
Updated: 2024-12-05T16:51:54.353Z
NVD
Status : Awaiting Analysis
Published: 2024-12-05T14:15:20.850
Modified: 2024-12-05T17:15:11.720
Link: CVE-2024-40763
Redhat
No data.