1 results (0.002 seconds)

CVSS: 6.9EPSS: 88%CPEs: 16EXPL: 1

Stack-based buffer overflow in SafeNet SoftRemote 10.8.5 (Build 2) and 10.3.5 (Build 6), and possibly other versions before 10.8.9, allows local users to execute arbitrary code via a long string in a (1) TREENAME or (2) GROUPNAME Policy file (spd). Desbordamiento de búfer basado en pila en SafeNet SoftRemote v10.8.5 (Build 2) y v10.3.5 (Build 6), y posiblemente otras versiones anteriores a v10.8.9, permite a usuarios locales ejecutar código de su elección a través de una cadena larga en (1) TREENAME o (2) un archivo GROUPNAME Policy (spd). • https://www.exploit-db.com/exploits/16643 http://www.securityfocus.com/archive/1/507593/100/0/threaded http://www.securitytracker.com/id?1023117 http://www.senseofsecurity.com.au/advisories/SOS-09-008 http://www.vupen.com/english/advisories/2009/3108 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •