CVE-2020-11582
Summary
| CVE | CVE-2020-11582 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-04-06 21:15:00 UTC |
| Updated | 2021-09-16 13:44:00 UTC |
| Description | An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, launches a TCP server that accepts local connections on a random port. This can be reached by local HTTP clients, because up to 25 invalid lines are ignored, and because DNS rebinding can occur. (This server accepts, for example, a setcookie command that might be relevant to CVE-2020-11581 exploitation.) |
Risk And Classification
Problem Types: CWE-668
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Apple | Macos | - | All | All | All |
| Operating System | Apple | Mac Os | - | All | All | All |
| Operating System | Apple | Mac Os | - | All | All | All |
| Operating System | Linux | Linux Kernel | - | All | All | All |
| Operating System | Linux | Linux Kernel | - | All | All | All |
| Operating System | Oracle | Solaris | - | All | All | All |
| Operating System | Oracle | Solaris | - | All | All | All |
| Application | Pulsesecure | Pulse Connect Secure | All | All | All | All |
| Application | Pulsesecure | Pulse Policy Secure | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Public KB - SA44426 - 2020-04: Out-of-Cycle Advisory: Multiple Host Checker Vulnerabilities | CONFIRM | kb.pulsesecure.net | |
| g/pulse-host-checker-rce: MITM RCE Host Checker for Pulse Secure - Gogs | MISC | git.lsd.cat | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.