Vulnerability Note VU#909678

DameWare Mini Remote Control vulnerable to buffer overflow via specially crafted packets

Original Release date: 22 Dec 2003 | Last revised: 22 Dec 2003


DameWare Mini Remote Control is a lightweight remote control intended primarily for administrators and help desks for management of desktop systems. A vulnerability in DameWare Mini Remote Control may permit an unauthenticated attacker to execute arbitrary code on the system.


A buffer overflow vulnerability has been discovered in versions of DameWare Mini Remote Control prior to 3.73. A remote attacker can send a specially crafted packet to the DameWare Mini Remote Control (default port 6129/TCP) to mimic a client and exploit this vulnerability against the server. Since the buffer overflow occurs in a section of the code used to handle authentication, a remote unauthenticated attacker can execute arbitrary code on the system.

The CERT/CC has seen reports of active exploitation.


An unauthenticated attacker can exploit this vulnerability to execute arbitrary code.


This vulnerability is resolved in version 3.73 or higher.

Block access to the DameWare Mini Remote Control Service port (default 6129/TCP) at the network perimeter. This will not mitigate attacks from within the firewall perimeter, but may mitigate attacks from outside your network.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
DameWareAffected-22 Dec 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Wirepair has reported this vulnerability.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: Unknown
  • Date Public: 14 Dec 2003
  • Date First Published: 22 Dec 2003
  • Date Last Updated: 22 Dec 2003
  • Severity Metric: 29.77
  • Document Revision: 8


If you have feedback, comments, or additional information about this vulnerability, please send us email.