search menu icon-carat-right cmu-wordmark

CERT Coordination Center

DameWare Mini Remote Control vulnerable to buffer overflow via specially crafted packets

Vulnerability Note VU#909678

Original Release Date: 2003-12-22 | Last Revised: 2003-12-22


DameWare Mini Remote Control is a lightweight remote control intended primarily for administrators and help desks for management of desktop systems. A vulnerability in DameWare Mini Remote Control may permit an unauthenticated attacker to execute arbitrary code on the system.


A buffer overflow vulnerability has been discovered in versions of DameWare Mini Remote Control prior to 3.73. A remote attacker can send a specially crafted packet to the DameWare Mini Remote Control (default port 6129/TCP) to mimic a client and exploit this vulnerability against the server. Since the buffer overflow occurs in a section of the code used to handle authentication, a remote unauthenticated attacker can execute arbitrary code on the system.

The CERT/CC has seen reports of active exploitation.


An unauthenticated attacker can exploit this vulnerability to execute arbitrary code.


This vulnerability is resolved in version 3.73 or higher.

Block access to the DameWare Mini Remote Control Service port (default 6129/TCP) at the network perimeter. This will not mitigate attacks from within the firewall perimeter, but may mitigate attacks from outside your network.

Vendor Information


DameWare Affected

Updated:  December 22, 2003



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Please see the December 4, 2003 entry at for the product history related to this issue.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Wirepair has reported this vulnerability.

This document was written by Jason A Rafail.

Other Information

CVE IDs: None
Severity Metric: 29.77
Date Public: 2003-12-14
Date First Published: 2003-12-22
Date Last Updated: 2003-12-22 21:16 UTC
Document Revision: 9

Sponsored by CISA.