Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests.
References
Link | Resource |
---|---|
http://www.exploit-db.com/exploits/15259 | Exploit |
http://www.exploit-db.com/exploits/15337 | Exploit |
http://www.securityfocus.com/bid/44150 | Exploit |
http://aluigi.org/adv/realwin_1-adv.txt | Exploit |
http://secunia.com/advisories/41849 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2010-11-01 19:26
Updated : 2010-11-03 21:00
NVD link : CVE-2010-4142
Mitre link : CVE-2010-4142
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
realflex
- realwin