Описание
Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.
Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2011-0517
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64716
- http://aluigi.org/adv/winlog_1-adv.txt
- http://osvdb.org/70418
- http://secunia.com/advisories/42894
- http://securityreason.com/securityalert/8280
- http://www.exploit-db.com/exploits/15992
- http://www.kb.cert.org/vuls/id/496040
- http://www.securityfocus.com/bid/45813
- http://www.us-cert.gov/control_systems/pdf/ICSA-11-017-02.pdf
- http://www.vupen.com/english/advisories/2011/0126
Связанные уязвимости
nvd
около 15 лет назад
Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.