Pulse Secure Virtual Application Delivery Controller
By the Year
In 2023 there have been 0 vulnerabilities in Pulse Secure Virtual Application Delivery Controller . Pulse Secure Virtual Application Delivery Controller did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 3 | 7.50 |
2018 | 0 | 0.00 |
It may take a day or so for new Pulse Secure Virtual Application Delivery Controller vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Pulse Secure Virtual Application Delivery Controller Security Vulnerabilities
Jonathan Looney discovered
CVE-2019-11477
7.5 - High
- June 19, 2019
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
Integer Overflow or Wraparound
Jonathan Looney discovered
CVE-2019-11478
7.5 - High
- June 19, 2019
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
Resource Exhaustion
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes
CVE-2019-11479
7.5 - High
- June 19, 2019
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.
Resource Exhaustion
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Red Hat Virtualization or by Pulse Secure? Click the Watch button to subscribe.
