A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-26409 | A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux. |
Fixes
Solution
This issue is fixed in GlobalProtect app 5.1.9 on Windows, GlobalProtect app 5.2.8 on Windows and on Universal Windows Platform, GlobalProtect app 5.3.1 on Linux, and all later GlobalProtect app versions.
Workaround
There are no known workarounds for this issue.
References
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2021-3057 |
|
History
No history.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-17T01:35:48.767Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-3057
No data.
Status : Modified
Published: 2021-10-13T16:15:07.783
Modified: 2024-11-21T06:20:52.090
Link: CVE-2021-3057
No data.
OpenCVE Enrichment
No data.
EUVD