Stack-based buffer overflow in SafeNet SoftRemote 10.8.5 (Build 2) and 10.3.5 (Build 6), and possibly other versions prior to 10.8.9, allows local users to execute arbitrary code via a long string in a (1) TREENAME or (2) GROUPNAME Policy file (spd).
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
safenet-inc softremote 1.9.0 |
||
safenet-inc softremote |
||
safenet-inc softremote 10.8.7 |
||
safenet-inc softremote 10.8.0 |
||
safenet-inc softremote 10.8.3 |
||
safenet-inc softremote 1.7.7 |
||
safenet-inc softremote 10.3.5 |
||
safenet-inc softremote 10.7.7 |
||
safenet-inc softremote 10.8.6 |
||
safenet-inc softremote 1.7.2 |
||
safenet-inc softremote 1.7.1 |
||
safenet-inc softremote 10.8.5 |
||
safenet-inc softremote 1.8.1 |
||
safenet-inc softremote 10.8.2 |
||
safenet-inc softremote 10.8.1 |
||
safenet-inc softremote 10.8.4 |