CVE-2021-20048
10.01.2022, 14:10
A Stack-based buffer overflow in the SonicOS SessionID HTTP response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions.Enginsight
Vendor | Product | Version |
---|---|---|
sonicwall | sonicos | 𝑥 ≤ 7.0.1-r1456 |
sonicwall | sonicos | 𝑥 ≤ 7.0.1-5023-1349 |
sonicwall | sonicos | 𝑥 ≤ 7.0.1-5018-r1715 |
sonicwall | sonicos | 𝑥 ≤ 6.5.4.8 |
sonicwall | sonicos | 𝑥 ≤ 6.5.1.13-1n |
sonicwall | sonicos | 𝑥 ≤ 6.0.5.3-94o |
sonicwall | sonicos | 𝑥 ≤ 5.9.1.13 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.