exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SafeNet SoftRemote Local Buffer Overflow

SafeNet SoftRemote Local Buffer Overflow
Posted Oct 30, 2009
Site senseofsecurity.com.au

SafeNet SoftRemote is vulnerable to a local stack based buffer overflow which can lead to the compromise of a vulnerable system. Versions 10.8.5 Build 2 and 10.3.5 Build 6 are verified vulnerable.

tags | advisory, overflow, local
SHA-256 | 56225e9982cc70db07769c44299eba3647755fa089c5db795da3b7b2d5d1a7c8

SafeNet SoftRemote Local Buffer Overflow

Change Mirror Download
SafeNet SoftRemote Local Buffer Overflow - Security Advisory - SOS-09-008


Release Date. 30-Oct-2009
Vendor Notification Date. 20-Jul-2009
Product. SafeNet SoftRemote
Platform. Microsoft Windows
Affected versions. 10.8.5 (Build 2), 10.3.5 (Build 6)
verified and possibly others.
Other vendors which have OEM'd the
client.
Severity Rating. High
Impact. System access
Attack Vector. Local
Solution Status. Fixed in 10.8.9 (unverified)
CVE reference. Not currently assigned

Details.
SafeNet SoftRemote is an IPsec VPN client that sets up a secure
channel for data transport. The application is a popular VPN client
which has been OEM'd by many other companies. As a result this
vulnerability affects a number of products and vendors. SafeNet
SoftRemote is vulnerable to a local stack based buffer overflow
which can lead to the compromise of a vulnerable system.

The vulnerability is caused due to a boundary error when processing
certain sections of spd (policy) files. Passing an overly long
string to either "TREENAME" or "GROUPNAME" will trigger the
overflow. Successful exploitation results in the execution of
arbitrary code.

Solution.
Fixed in 10.8.9 (unverified).

Discovered by.
Brett Gervasoni from SOS Labs.

About us.

Sense of Security is a leading provider of information security and risk
management solutions. Our team has expert skills in assessment and
assurance, strategy and architecture, and deployment through to ongoing
management. We are Australia's premier application penetration testing firm
and trusted IT security advisor to many of the countries largest
organisations.

Sense of Security Pty Ltd

Level 3, 66 King St
Sydney NSW 2000
AUSTRALIA

T: +61 (0)2 9290 4444
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au
E: info@senseofsecurity.com.au
Twitter: ITsecurityAU

The latest version of this advisory can be found at:
http://www.senseofsecurity.com.au/advisories/SOS-09-008

A video demonstrating this exploit can be found at:
http://www.senseofsecurity.com.au/movies/SOS-09-008-safenet.mp4

Other Sense of Security advisories can be found at:
http://www.senseofsecurity.com.au/research/it-security-advisories.php

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close