4.6
CVSSv2

CVE-2020-8249

Published: 28/10/2020 Updated: 17/08/2021
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local malicious users to perform buffer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pulsesecure pulse secure desktop client

pulsesecure pulse secure desktop client 9.1

Github Repositories

CVE-2020-8249: Buffer Overflow in Pulse Secure VPN Linux Client

CVE-2020-8249: Buffer Overflow in Pulse Secure VPN Linux Client The root SUID executable pulsesvc, has a function “do_upload” that unsafely calls a “sprintf” which can result in a buffer overflow Because the “sprintf” writes the values on the stack, if a big enough string is passed to it, then it can result in the overwrite of the legitimate