CVE-2023-6340

SonicWall Capture Client version 3.7.10, NetExtender client version 10.2.337 and earlier versions are installed with sfpmonitor.sys driver. The driver has been found to be vulnerable to Denial-of-Service (DoS) caused by Stack-based Buffer Overflow vulnerability.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sonicwall:capture_client:*:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*

History

29 Jan 2024, 17:17

Type Values Removed Values Added
References () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0019 - () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0019 - Vendor Advisory
CPE cpe:2.3:a:sonicwall:capture_client:*:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-787
First Time Sonicwall capture Client
Sonicwall
Sonicwall netextender

18 Jan 2024, 13:42

Type Values Removed Values Added
Summary
  • (es) SonicWall Capture Client versión 3.7.10, NetExtender client versión 10.2.337 y versiones anteriores se instalan con el controlador sfpmonitor.sys. Se ha descubierto que el controlador es vulnerable a la denegación de servicio (DoS) causada por una vulnerabilidad de desbordamiento de búfer en la región stack de la memoria.

18 Jan 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-18 00:15

Updated : 2024-01-29 17:17


NVD link : CVE-2023-6340

Mitre link : CVE-2023-6340

CVE.ORG link : CVE-2023-6340


JSON object : View

Products Affected

sonicwall

  • capture_client
  • netextender
CWE
CWE-787

Out-of-bounds Write

CWE-121

Stack-based Buffer Overflow