9.3
CVSSv2

CVE-2007-6273

Published: 07/12/2007 Updated: 08/03/2011
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple format string vulnerabilities in the configuration file in SonicWALL GLobal VPN Client 3.1.556 and 4.0.0.810 allow user-assisted remote malicious users to execute arbitrary code via format string specifiers in the (1) Hostname tag or the (2) name attribute in the Connection tag. NOTE: there might not be any realistic circumstances in which this issue crosses privilege boundaries.

Vulnerable Product Search on Vulmon Subscribe to Product

sonicwall global vpn client 3.1.556

sonicwall global vpn client 4.0.0.810

Exploits

source: wwwsecurityfocuscom/bid/26689/info SonicWALL Global VPN Client is prone to a remote format-string vulnerability because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function Successfully exploiting this issue allows remote attackers to execute arbitrary machi ...