A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room.
References
Link | Resource |
---|---|
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-05-27 05:15
Updated : 2022-08-30 12:15
NVD link : CVE-2021-22894
Mitre link : CVE-2021-22894
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
pulsesecure
- pulse_connect_secure