SonicWall.Global.VPN.Client.Remote.Format.String
Description
This indicates an attack attempt to exploit a Format String vulnerability in SonicWALL Global VPN Client.
The vulnerability is a result of the application's failure to properly sanitize user supplied inputs. A remote attacker can exploit this to possibly execute arbitrary code within the context of the application or cause a Denial of Service condition.
Affected Products
SonicWALL Global VPN Client 4.0.782 and earlier versions.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Upgrade to the latest version available from the website:
http://help.mysonicwall.com/Applications/vpnclient/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-02-01 | 14.540 | Name:SonicWALL. Global. VPN. Client. Remote. Format. String:SonicWall. Global. VPN. Client. Remote. Format. String |