SynopsisThe remote host is affected by multiple vulnerabilities.
DescriptionAccording to its self-reported version, the remote SonicWall firewall is running a version of SonicOS that is affected by multiple vulnerabilities:
- Stack overflow in the parsing of IPv4 packets IP options. (CVE-2019-12256)
- TCP Urgent Pointer = 0 leads to integer underflow (CVE-2019-12255)
- TCP Urgent Pointer state confusion caused by malformed TCP AO option (CVE-2019-12260)
- TCP Urgent Pointer state confusion during connect to a remote host (CVE-2019-12261)
- TCP Urgent Pointer state confusion due to race condition (CVE-2019-12263)
- Heap overflow in DHCP Offer/ACK parsing in ipdhcpc (CVE-2019-12257)
- TCP connection DoS via malformed TCP options (CVE-2019-12258)
- Handling of unsolicited Reverse ARP replies (Logical Flaw) (CVE-2019-12262)
- Logical flaw in IPv4 assignment by the ipdhcpc DHCP client (CVE-2019-12264)
- DoS via NULL dereference in IGMP parsing (CVE-2019-12259)
- IGMP Information leak via IGMPv3 specific membership report (CVE-2019-12265)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
SolutionUpgrade to the relevant fixed version referenced in the vendor security advisory.