A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2021-3057 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-17T01:35:48.767Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-3057

No data.

Status : Modified
Published: 2021-10-13T16:15:07.783
Modified: 2024-11-21T06:20:52.090
Link: CVE-2021-3057

No data.