Описание
Stack-based buffer overflow in the DPC Proxy server (DpcProxy.exe) in ASUS Remote Console (aka ARC or ASMB3) 2.0.0.19 and 2.0.0.24 allows remote attackers to execute arbitrary code via a long string to TCP port 623.
Stack-based buffer overflow in the DPC Proxy server (DpcProxy.exe) in ASUS Remote Console (aka ARC or ASMB3) 2.0.0.19 and 2.0.0.24 allows remote attackers to execute arbitrary code via a long string to TCP port 623.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-1491
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41358
- https://www.exploit-db.com/exploits/5694
- http://aluigi.altervista.org/adv/asuxdpc-adv.txt
- http://secunia.com/advisories/29402
- http://securityreason.com/securityalert/3771
- http://www.securityfocus.com/archive/1/489966/100/0/threaded
- http://www.securityfocus.com/bid/28394
- http://www.vupen.com/english/advisories/2008/0982/references
Связанные уязвимости
nvd
почти 18 лет назад
Stack-based buffer overflow in the DPC Proxy server (DpcProxy.exe) in ASUS Remote Console (aka ARC or ASMB3) 2.0.0.19 and 2.0.0.24 allows remote attackers to execute arbitrary code via a long string to TCP port 623.