Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-0900

Опубликовано: 02 фев. 2011
Источник: redhat
CVSS2: 2.6
EPSS Средний

Описание

Stack-based buffer overflow in the tsc_launch_remote function (src/support.c) in Terminal Server Client (tsclient) 0.150, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a .RDP file with a long hostname argument.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4tsclientAffected
Red Hat Enterprise Linux 5tsclientAffected
Red Hat Enterprise Linux 6tsclientUnder investigation

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=675846tsclient: multiple stack-based buffer overflows in tsc_launch_remote()

EPSS

Процентиль: 95%
0.19908
Средний

2.6 Low

CVSS2

Связанные уязвимости

ubuntu
почти 15 лет назад

Stack-based buffer overflow in the tsc_launch_remote function (src/support.c) in Terminal Server Client (tsclient) 0.150, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a .RDP file with a long hostname argument.

nvd
почти 15 лет назад

Stack-based buffer overflow in the tsc_launch_remote function (src/support.c) in Terminal Server Client (tsclient) 0.150, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a .RDP file with a long hostname argument.

debian
почти 15 лет назад

Stack-based buffer overflow in the tsc_launch_remote function (src/sup ...

github
больше 3 лет назад

Stack-based buffer overflow in the tsc_launch_remote function (src/support.c) in Terminal Server Client (tsclient) 0.150, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a .RDP file with a long hostname argument.

EPSS

Процентиль: 95%
0.19908
Средний

2.6 Low

CVSS2