CVE-2023-39279
https://notcve.org/view.php?id=CVE-2023-39279
SonicOS post-authentication Stack-Based Buffer Overflow vulnerability in the getPacketReplayData.json URL endpoint leads to a firewall crash. La vulnerabilidad de desbordamiento del búfer basado posterior a la autenticación de SonicOS en el endpoint de URL getPacketReplayData.json provoca una falla del firewall. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2023-39278
https://notcve.org/view.php?id=CVE-2023-39278
SonicOS post-authentication user assertion failure leads to Stack-Based Buffer Overflow vulnerability via main.cgi leads to a firewall crash. La falla de aserción del usuario posterior a la autenticación de SonicOS conduce a una vulnerabilidad de desbordamiento del búfer a través de main.cgi que provoca una falla del firewall. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2023-39277
https://notcve.org/view.php?id=CVE-2023-39277
SonicOS post-authentication stack-based buffer overflow vulnerability in the sonicflow.csv and appflowsessions.csv URL endpoints leads to a firewall crash. La vulnerabilidad de desbordamiento del búfer de autenticación posterior de SonicOS en los endpoints de URL sonicflow.csv y appflowsessions.csv provoca una falla del firewall. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2023-39276
https://notcve.org/view.php?id=CVE-2023-39276
SonicOS post-authentication stack-based buffer overflow vulnerability in the getBookmarkList.json URL endpoint leads to a firewall crash. La vulnerabilidad de desbordamiento del búfer de autenticación posterior de SonicOS en el endpoint de la URL getBookmarkList.json provoca una falla del firewall. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2022-47522
https://notcve.org/view.php?id=CVE-2022-47522
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key. • https://papers.mathyvanhoef.com/usenix2023-wifi.pdf https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006 https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc https://www.wi-fi.org/discover-wi-fi/passpoint • CWE-290: Authentication Bypass by Spoofing •