Vulnerability identifier: #VU52874
Vulnerability risk: Medium
Exploitation vector: Network
Exploit availability: No
Vendor: Pulse Secure
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Pulse Connect Secure Collaboration Suite. A remote user can trigger memory corruption and execute arbitrary code on the target system as the root user via a maliciously crafted meeting room.
Install updates from vendor's website.
Vulnerable software versions
Pulse Connect Secure: 9.0R1 - 9.1R11.3
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.