Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests.
References
Link | Resource |
---|---|
http://aluigi.org/adv/realwin_1-adv.txt | Exploit |
http://secunia.com/advisories/41849 | Vendor Advisory |
http://www.exploit-db.com/exploits/15259 | Exploit |
http://www.exploit-db.com/exploits/15337 | Exploit |
http://www.securityfocus.com/bid/44150 | Exploit |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2010-11-02 02:26
Updated : 2024-02-04 17:54
NVD link : CVE-2010-4142
Mitre link : CVE-2010-4142
CVE.ORG link : CVE-2010-4142
JSON object : View
Products Affected
realflex
- realwin
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer