search menu icon-carat-right cmu-wordmark

CERT Coordination Center

DameWare Mini Remote Control vulnerable to buffer overflow via specially crafted authentication requests

Vulnerability Note VU#170905

Original Release Date: 2005-09-07 | Last Revised: 2005-09-07


A vulnerability in DameWare Mini Remote Control may permit an unauthenticated attacker to execute arbitrary code on the system.


DameWare Mini Remote Control is a lightweight remote control program intended primarily for administrators and help desks to manage desktop systems.

A buffer overflow vulnerability has been discovered in versions of DameWare Mini Remote Control prior to 4.9.0. A remote attacker can send a specially crafted packet to the DameWare Mini Remote Control (default port 6129/TCP) to mimic a client and exploit this vulnerability. Since the buffer overflow occurs in a section of the code used to handle authentication, a remote unauthenticated attacker can execute arbitrary code on a system.

The CERT/CC has seen reports of active exploitation of a similar vulnerability, CERT VU#909678.


A remote, unauthenticated attacker can exploit this vulnerability to execute arbitrary code.


Apply an update
This issue is addressed in version 4.9.0 (alternate link).

Workarounds and mitigation
Block access to the DameWare Mini Remote Control Service port (default 6129/TCP) at the network perimeter. This will not mitigate attacks from within the firewall perimeter, but may mitigate attacks from outside your network.

Vendor Information


DameWare Affected

Notified:  September 07, 2005 Updated: September 07, 2005



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


This issue is addressed in version 4.9.0 (alternate link).

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to AD for reporting this vulnerability.

This document was written by Ken MacInnis.

Other Information

CVE IDs: None
Severity Metric: 18.73
Date Public: 2005-08-31
Date First Published: 2005-09-07
Date Last Updated: 2005-09-07 20:04 UTC
Document Revision: 10

Sponsored by CISA.