Vulnerability Note VU#909678
DameWare Mini Remote Control vulnerable to buffer overflow via specially crafted packets
DameWare Mini Remote Control is a lightweight remote control intended primarily for administrators and help desks for management of desktop systems. A vulnerability in DameWare Mini Remote Control may permit an unauthenticated attacker to execute arbitrary code on the system.
A buffer overflow vulnerability has been discovered in versions of DameWare Mini Remote Control prior to 3.73. A remote attacker can send a specially crafted packet to the DameWare Mini Remote Control (default port 6129/TCP) to mimic a client and exploit this vulnerability against the server. Since the buffer overflow occurs in a section of the code used to handle authentication, a remote unauthenticated attacker can execute arbitrary code on the system.
The CERT/CC has seen reports of active exploitation.
An unauthenticated attacker can exploit this vulnerability to execute arbitrary code.
This vulnerability is resolved in version 3.73 or higher.
Block access to the DameWare Mini Remote Control Service port (default 6129/TCP) at the network perimeter. This will not mitigate attacks from within the firewall perimeter, but may mitigate attacks from outside your network.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|DameWare||Affected||-||22 Dec 2003|
CVSS Metrics (Learn More)
Wirepair has reported this vulnerability.
This document was written by Jason A Rafail.
- CVE IDs: Unknown
- Date Public: 14 Dec 2003
- Date First Published: 22 Dec 2003
- Date Last Updated: 22 Dec 2003
- Severity Metric: 29.77
- Document Revision: 8
If you have feedback, comments, or additional information about this vulnerability, please send us email.