Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.
References
Configurations
History
21 Nov 2024, 01:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.org/adv/winlog_1-adv.txt - Exploit | |
References | () http://osvdb.org/70418 - | |
References | () http://secunia.com/advisories/42894 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/8280 - | |
References | () http://www.exploit-db.com/exploits/15992 - Exploit | |
References | () http://www.kb.cert.org/vuls/id/496040 - US Government Resource | |
References | () http://www.securityfocus.com/bid/45813 - Exploit | |
References | () http://www.us-cert.gov/control_systems/pdf/ICSA-11-017-02.pdf - | |
References | () http://www.vupen.com/english/advisories/2011/0126 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/64716 - |
Information
Published : 2011-01-20 19:00
Updated : 2024-11-21 01:24
NVD link : CVE-2011-0517
Mitre link : CVE-2011-0517
CVE.ORG link : CVE-2011-0517
JSON object : View
Products Affected
sielcosistemi
- winlog_pro
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer