header-logo
Suggest Exploit
vendor:
Connect
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Connect
Affected Version From: 4.1.2.13
Affected Version To: 4.1.2.13
Patch Exists: YES
Related CWE: N/A
CPE: aventail_connect
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2007

Aventail Connect Buffer Overflow Vulnerability

Aventail Connect is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker may exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service.

Mitigation:

Ensure that user-supplied data is properly validated before being used.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/23717/info

Aventail Connect is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

An attacker may exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts wlll result in a denial of service.

This issue affects Aventail Connect 4.1.2.13; other versions may also be affected. 

ssh $(perl -e 'print 'a'x2200')