VAR-200711-0039
Vulnerability from variot - Updated: 2023-12-18 12:58Multiple buffer overflows in the SonicWall SSL-VPN NetExtender NELaunchCtrl ActiveX control before 2.1.0.51, and 2.5.x before 2.5.0.56, allow remote attackers to execute arbitrary code via a long (1) serverAddress, (2) sessionId, (3) clientIPLower, (4) clientIPHigher, (5) userName, (6) domainName, or (7) dnsSuffix Unicode property value. NOTE: the AddRouteEntry vector is covered by CVE-2007-5603. SonicWall SSL-VPN NetExtender NELaunchCtrl ActiveX The control contains a buffer overflow vulnerability. SonicWALL SSL VPN Client is prone to multiple remote vulnerabilities. The issues occur in different ActiveX controls and include arbitrary-file-deletion and multiple stack-based buffer-overflow vulnerabilities. Attackers can exploit these issues to execute arbitrary code within the context of the affected application and delete arbitrary files on the client's computer. Failed exploit attempts will result in denial-of-service conditions. These issues affect SonicWALL SSL VPN 1.3.0.3 software as well as WebCacheCleaner 1.3.0.3 and NeLaunchCtrl 2.1.0.49 ActiveX controls; other versions may also be vulnerable. SonicWALL SSL-VPN can provide simple and easy-to-use VPN solutions for enterprise networks. There are multiple security holes in the ActiveX control implementation of SonicWALL SSL-VPN, and remote attackers may take advantage of these holes to control the user system.
2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.
Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv
TITLE: SonicWALL SSL VPN ActiveX Controls Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA27469
VERIFY ADVISORY: http://secunia.com/advisories/27469/
CRITICAL: Highly critical
IMPACT: Manipulation of data, System access
WHERE:
From remote
OPERATING SYSTEM: SonicWALL SSL-VPN 2000 2.x http://secunia.com/product/9056/ SonicWALL SSL-VPN 200 2.x http://secunia.com/product/16416/ SonicWALL SSL-VPN 4000 2.x http://secunia.com/product/16417/
DESCRIPTION: Some vulnerabilities have been reported in SonicWALL SSL VPN, which can be exploited by malicious people to delete arbitrary files or to compromise a user's system.
1) Boundary errors within the NetExtender NELaunchCtrl ActiveX control when handling arguments passed to certain methods (e.g. "AddRouteEntry()", "serverAddress()", "sessionId()", "clientIPLower()", "clientIPHigher()", "userName()", "domainName()", and "dnsSuffix()") can be exploited to cause buffer overflows when a user e.g. visits a malicious website. Other versions may also be affected.
SOLUTION: Update to firmware version 2.5 for SonicWALL SSL VPN 2000/4000, and version 2.1 for SonicWALL SSL-VPN 200. http://www.sonicwall.com/us/643.htm
PROVIDED AND/OR DISCOVERED BY: 1) Independently discovered by: * lofi42 * Will Dormann, CERT/CC ("AddRouteEntry()" method) 2) lofi42
ORIGINAL ADVISORY: SEC Consult: http://www.sec-consult.com/fileadmin/Advisories/20071101-0_sonicwall_multiple.txt
US-CERT VU#298521: http://www.kb.cert.org/vuls/id/298521
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200711-0039",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ssl vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "sonicwall",
"version": "2.1"
},
{
"model": "ssl vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "sonicwall",
"version": "2.5"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "sonicwall",
"version": null
},
{
"model": "ssl vpn",
"scope": "lt",
"trust": 0.8,
"vendor": "sonicwall",
"version": "2.5.x"
},
{
"model": "ssl vpn",
"scope": "eq",
"trust": 0.8,
"vendor": "sonicwall",
"version": "2.5.0.56"
},
{
"model": "ssl vpn",
"scope": "eq",
"trust": 0.6,
"vendor": "sonicwall",
"version": "2.5"
},
{
"model": "ssl vpn",
"scope": "eq",
"trust": 0.6,
"vendor": "sonicwall",
"version": "2.1"
},
{
"model": "ssl vpn",
"scope": "eq",
"trust": 0.3,
"vendor": "sonicwall",
"version": "1.33"
},
{
"model": "ssl vpn",
"scope": "ne",
"trust": 0.3,
"vendor": "sonicwall",
"version": "2002.1"
},
{
"model": "ssl vpn",
"scope": "ne",
"trust": 0.3,
"vendor": "sonicwall",
"version": "2.5"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#298521"
},
{
"db": "BID",
"id": "26288"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-006293"
},
{
"db": "NVD",
"id": "CVE-2007-5814"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-065"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sonicwall:ssl_vpn:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:ssl_vpn:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-5814"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Bernhard Mueller research@sec-consult.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200711-065"
}
],
"trust": 0.6
},
"cve": "CVE-2007-5814",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2007-5814",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-29176",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2007-5814",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#298521",
"trust": 0.8,
"value": "25.92"
},
{
"author": "CNNVD",
"id": "CNNVD-200711-065",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-29176",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#298521"
},
{
"db": "VULHUB",
"id": "VHN-29176"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-006293"
},
{
"db": "NVD",
"id": "CVE-2007-5814"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-065"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple buffer overflows in the SonicWall SSL-VPN NetExtender NELaunchCtrl ActiveX control before 2.1.0.51, and 2.5.x before 2.5.0.56, allow remote attackers to execute arbitrary code via a long (1) serverAddress, (2) sessionId, (3) clientIPLower, (4) clientIPHigher, (5) userName, (6) domainName, or (7) dnsSuffix Unicode property value. NOTE: the AddRouteEntry vector is covered by CVE-2007-5603. SonicWall SSL-VPN NetExtender NELaunchCtrl ActiveX The control contains a buffer overflow vulnerability. SonicWALL SSL VPN Client is prone to multiple remote vulnerabilities. The issues occur in different ActiveX controls and include arbitrary-file-deletion and multiple stack-based buffer-overflow vulnerabilities. \nAttackers can exploit these issues to execute arbitrary code within the context of the affected application and delete arbitrary files on the client\u0027s computer. Failed exploit attempts will result in denial-of-service conditions. \nThese issues affect SonicWALL SSL VPN 1.3.0.3 software as well as WebCacheCleaner 1.3.0.3 and NeLaunchCtrl 2.1.0.49 ActiveX controls; other versions may also be vulnerable. SonicWALL SSL-VPN can provide simple and easy-to-use VPN solutions for enterprise networks. There are multiple security holes in the ActiveX control implementation of SonicWALL SSL-VPN, and remote attackers may take advantage of these holes to control the user system. \n\n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nGet a free trial of the Secunia Vulnerability Intelligence Solutions:\nhttp://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv\n\n----------------------------------------------------------------------\n\nTITLE:\nSonicWALL SSL VPN ActiveX Controls Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA27469\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/27469/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nManipulation of data, System access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nSonicWALL SSL-VPN 2000 2.x\nhttp://secunia.com/product/9056/\nSonicWALL SSL-VPN 200 2.x\nhttp://secunia.com/product/16416/\nSonicWALL SSL-VPN 4000 2.x\nhttp://secunia.com/product/16417/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in SonicWALL SSL VPN, which\ncan be exploited by malicious people to delete arbitrary files or to\ncompromise a user\u0027s system. \n\n1) Boundary errors within the NetExtender NELaunchCtrl ActiveX\ncontrol when handling arguments passed to certain methods (e.g. \n\"AddRouteEntry()\", \"serverAddress()\", \"sessionId()\",\n\"clientIPLower()\", \"clientIPHigher()\", \"userName()\", \"domainName()\",\nand \"dnsSuffix()\") can be exploited to cause buffer overflows when a\nuser e.g. visits a malicious website. \nOther versions may also be affected. \n\nSOLUTION:\nUpdate to firmware version 2.5 for SonicWALL SSL VPN 2000/4000, and\nversion 2.1 for SonicWALL SSL-VPN 200. \nhttp://www.sonicwall.com/us/643.htm\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Independently discovered by:\n* lofi42\n* Will Dormann, CERT/CC (\"AddRouteEntry()\" method)\n2) lofi42\n\nORIGINAL ADVISORY:\nSEC Consult:\nhttp://www.sec-consult.com/fileadmin/Advisories/20071101-0_sonicwall_multiple.txt\n\nUS-CERT VU#298521:\nhttp://www.kb.cert.org/vuls/id/298521\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-5814"
},
{
"db": "CERT/CC",
"id": "VU#298521"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-006293"
},
{
"db": "BID",
"id": "26288"
},
{
"db": "VULHUB",
"id": "VHN-29176"
},
{
"db": "PACKETSTORM",
"id": "60650"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2007-5814",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "27469",
"trust": 2.7
},
{
"db": "BID",
"id": "26288",
"trust": 2.0
},
{
"db": "SREASON",
"id": "3342",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2007-3696",
"trust": 1.7
},
{
"db": "CERT/CC",
"id": "VU#298521",
"trust": 1.2
},
{
"db": "JVNDB",
"id": "JVNDB-2007-006293",
"trust": 0.8
},
{
"db": "BUGTRAQ",
"id": "20071101 SEC CONSULT SA-20071101-0 :: MULTIPLE VULNERABILITIES IN SONICWALLSSL-VPN CLIENT",
"trust": 0.6
},
{
"db": "XF",
"id": "38220",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200711-065",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-29176",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "60650",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#298521"
},
{
"db": "VULHUB",
"id": "VHN-29176"
},
{
"db": "BID",
"id": "26288"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-006293"
},
{
"db": "PACKETSTORM",
"id": "60650"
},
{
"db": "NVD",
"id": "CVE-2007-5814"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-065"
}
]
},
"id": "VAR-200711-0039",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-29176"
}
],
"trust": 0.23888890000000002
},
"last_update_date": "2023-12-18T12:58:59.270000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSL-VPN",
"trust": 0.8,
"url": "http://o-www.sonicwall.com/us/en/products/secure_remote_access.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-006293"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-29176"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-006293"
},
{
"db": "NVD",
"id": "CVE-2007-5814"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.sec-consult.com/fileadmin/advisories/20071101-0_sonicwall_multiple.txt"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/26288"
},
{
"trust": 1.7,
"url": "http://www.sec-consult.com/303.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/27469"
},
{
"trust": 1.7,
"url": "http://securityreason.com/securityalert/3342"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/483097/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2007/3696"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38220"
},
{
"trust": 0.9,
"url": "http://www.sonicwall.com/us/643.htm"
},
{
"trust": 0.9,
"url": "http://secunia.com/advisories/27469/"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5814"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-5814"
},
{
"trust": 0.6,
"url": "/archive/1/483097"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/38220"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/483097/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2007/3696"
},
{
"trust": 0.4,
"url": "http://www.kb.cert.org/vuls/id/298521"
},
{
"trust": 0.3,
"url": "http://support.microsoft.com/kb/240797"
},
{
"trust": 0.3,
"url": "http://www.sonicwall.com"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/9056/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/16417/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/16416/"
},
{
"trust": 0.1,
"url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#298521"
},
{
"db": "VULHUB",
"id": "VHN-29176"
},
{
"db": "BID",
"id": "26288"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-006293"
},
{
"db": "PACKETSTORM",
"id": "60650"
},
{
"db": "NVD",
"id": "CVE-2007-5814"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-065"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#298521"
},
{
"db": "VULHUB",
"id": "VHN-29176"
},
{
"db": "BID",
"id": "26288"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-006293"
},
{
"db": "PACKETSTORM",
"id": "60650"
},
{
"db": "NVD",
"id": "CVE-2007-5814"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-065"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-11-02T00:00:00",
"db": "CERT/CC",
"id": "VU#298521"
},
{
"date": "2007-11-05T00:00:00",
"db": "VULHUB",
"id": "VHN-29176"
},
{
"date": "2007-11-01T00:00:00",
"db": "BID",
"id": "26288"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-006293"
},
{
"date": "2007-11-03T02:36:00",
"db": "PACKETSTORM",
"id": "60650"
},
{
"date": "2007-11-05T18:46:00",
"db": "NVD",
"id": "CVE-2007-5814"
},
{
"date": "2007-11-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200711-065"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-04-13T00:00:00",
"db": "CERT/CC",
"id": "VU#298521"
},
{
"date": "2018-10-15T00:00:00",
"db": "VULHUB",
"id": "VHN-29176"
},
{
"date": "2007-11-15T00:37:00",
"db": "BID",
"id": "26288"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-006293"
},
{
"date": "2018-10-15T21:46:38.113000",
"db": "NVD",
"id": "CVE-2007-5814"
},
{
"date": "2007-11-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200711-065"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200711-065"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SonicWall NetExtender NELaunchCtrl ActiveX control stack buffer overflow",
"sources": [
{
"db": "CERT/CC",
"id": "VU#298521"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200711-065"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.