SB2024111422 - Multiple vulnerabilities in Ivanti Connect Secure and Policy Secure
Published: November 14, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 18 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2024-47905)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error. A remote privileged user can trigger a stack-based buffer overflow and perform a denial of service (DoS) attack.
2) Out-of-bounds read (CVE-ID: CVE-2024-37400)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition. A remote non-authenticated attacker can send a specially crafted request, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
3) Use-after-free (CVE-ID: CVE-2024-9420)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error. A remote user can send specially crafted request to the system and perform a denial of service (DoS) attack.
4) Untrusted search path (CVE-ID: CVE-2024-47906)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to usage of an untrusted search path. A local user can place a malicious binary into a specific location on the system and execute arbitrary code with escalated privileges.
5) Stack-based buffer overflow (CVE-ID: CVE-2024-47907)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in IPSec. A remote unauthenticated attacker can send a specially crafted request to the system, trigger a stack-based buffer overflow and perform a denial of service (DoS) attack.
6) Stack-based buffer overflow (CVE-ID: CVE-2024-47909)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error. A remote authenticated user can send a specially crafted request to the system, trigger a stack-based buffer overflow and perform a denial of service (DoS) attack.
7) NULL pointer dereference (CVE-ID: CVE-2024-8495)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can send specially crafted request to the system and perform a denial of service (DoS) attack.
8) Out-of-bounds write (CVE-ID: CVE-2024-38649)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in IPsec implementation. A remote attacker can send a specially crafted request to the system, trigger an out-of-bounds write and perform a denial of service (DoS) attack.
9) Improper neutralization of argument delimiters in a command (CVE-ID: CVE-2024-38655)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation. A local privileged user can pass a specially crafted arguments to a CLI and execute arbitrary code on the system.
10) Improper neutralization of argument delimiters in a command (CVE-ID: CVE-2024-38656)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation. A local privileged user can pass a specially crafted arguments to a CLI and execute arbitrary code on the system.
11) Incorrect default permissions (CVE-ID: CVE-2024-39709)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local user with access to the system can view contents of files and directories or modify them.
12) Improper neutralization of argument delimiters in a command (CVE-ID: CVE-2024-39710)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation. A local privileged user can pass a specially crafted arguments to a CLI and execute arbitrary code on the system.
13) Improper neutralization of argument delimiters in a command (CVE-ID: CVE-2024-39711)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation. A local privileged user can pass a specially crafted arguments to a CLI and execute arbitrary code on the system.
14) Improper neutralization of argument delimiters in a command (CVE-ID: CVE-2024-39712)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation. A local privileged user can pass a specially crafted arguments to a CLI and execute arbitrary code on the system.
15) OS Command Injection (CVE-ID: CVE-2024-11007)
The vulnerability allows a remote user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation. A remote privileged user can send a specially crafted HTTP request and execute arbitrary OS commands on the target system.
16) OS Command Injection (CVE-ID: CVE-2024-11006)
The vulnerability allows a remote user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation. A remote privileged user can send a specially crafted HTTP request and execute arbitrary OS commands on the target system.
17) OS Command Injection (CVE-ID: CVE-2024-11005)
The vulnerability allows a remote user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation. A remote privileged user can send a specially crafted HTTP request and execute arbitrary OS commands on the target system.
18) Cross-site scripting (CVE-ID: CVE-2024-11004)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install update from vendor's website.