what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Dell SonicWall NetExtender 7.5.215 Privilege Escalation

Dell SonicWall NetExtender 7.5.215 Privilege Escalation
Posted Aug 25, 2015
Authored by Andrew Smith of Sword and Shield

Dell SonicWall NetExtender version 7.5.215 suffers from a privilege escalation vulnerability.

tags | advisory
advisories | CVE-2015-4173
SHA-256 | f0b514cab106db17e65e6afa1d98fdd80dad6bd4d518110c106cfcff55f1bcd3

Dell SonicWall NetExtender 7.5.215 Privilege Escalation

Change Mirror Download
Dell SonicWall NetExtender Unquoted Autorun Privilege Escalation

Vendor Website : http://www.sonicwall.com

INDEX
---------------------------------------
1. CVE
2. Background
3. Description
4. Affected Products
5. Solution
6. Credit
7. Disclosure Timeline

1. CVE
---------------------------------------
CVE: 2015-4173


2. BACKGROUND
---------------------------------------
SonicWALL NetExtender is a transparent software application for users that enables remote users to securely connect to the remote network. With NetExtender, remote users can securely run any application on the remote network. Users can upload and download files, mount network drives, and access resources in the same way as if they were on the local network. The NetExtender connection uses a Point-to-Point Protocol (PPP) connection


3. DESCRIPTION
---------------------------------------
Upon installation of the product on the Windows operating system, an autorun value is created that does not put the path in quotes. Placement of a malicious binary by a potential attacker within the parent path could allow privileged code execution upon administrative login.


4. AFFECTED PRODUCTS
---------------------------------------
Dell SonicWall NetExtender 7.5.215


5. SOLUTION
---------------------------------------
Upgrade to firmware version 7.5.1.2 or 8.0.0.3.


6. CREDIT
---------------------------------------
This vulnerability was discovered by Andrew Smith of Sword & Shield Enterprise Security.


7. DISCLOSURE TIMELINE
---------------------------------------
5-24-2015 - Vulnerability Discovered/Vendor Informed
5-28-2015 - Vendor Confirmed Report/Vendor Gives Fix Timeline
5-29-2015 - CVE Requested
8-14-2015 - Fix Released and Public Disclosure by Vendor
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close