CVE-2022-41026

CVSS V2 None CVSS V3 None
Description
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no vpn pptp advanced name WORD dns (yes|no) mtu <128-16384> mru <128-16384> mppe (on|off) stateful (on|off) options WORD' command template.
Overview
  • CVE ID
  • CVE-2022-41026
  • Assigner
  • talos-cna@cisco.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-26T22:15:22
  • Last Modified Date
  • 2023-02-02T18:42:07
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:* 0 OR
History
Created Old Value New Value Data Type Notes
2023-01-26 23:19:27 Added to TrackCVE
2023-01-26 23:19:28 Weakness Enumeration new
2023-01-27 15:15:29 2023-01-27T14:03:31 CVE Modified Date updated
2023-01-27 15:15:29 Received Awaiting Analysis Vulnerability Status updated
2023-01-27 15:15:32 CVSS V3 information new
2023-02-01 15:14:18 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-02-01 15:14:21 CVSS V3 information new
2023-02-02 19:14:27 2023-02-02T18:42:07 CVE Modified Date updated
2023-02-02 19:14:27 Undergoing Analysis Analyzed Vulnerability Status updated
2023-02-02 19:14:31 Weakness Enumeration update
2023-02-02 19:14:31 CPE Information updated
2023-02-02 19:14:31 CVSS V3 information new