Page 2 of 6 results (0.003 seconds)

CVSS: 10.0EPSS: 78%CPEs: 2EXPL: 3

Stack-based buffer overflow in the DPC Proxy server (DpcProxy.exe) in ASUS Remote Console (aka ARC or ASMB3) 2.0.0.19 and 2.0.0.24 allows remote attackers to execute arbitrary code via a long string to TCP port 623. Desbordamiento de búfer basado en pila en el Servidor DPC Proxy (DpcProxy.exe) de ASUS Remote Console (también conocida como ARC o ASMB3) 2.0.0.19 y 2.0.0.24, permite a atacantes remotos ejecutar código de su elección mediante una cadena larga al puerto TCP 623. • https://www.exploit-db.com/exploits/5694 https://www.exploit-db.com/exploits/16425 http://aluigi.altervista.org/adv/asuxdpc-adv.txt http://secunia.com/advisories/29402 http://securityreason.com/securityalert/3771 http://www.securityfocus.com/archive/1/489966/100/0/threaded http://www.securityfocus.com/bid/28394 http://www.vupen.com/english/advisories/2008/0982/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41358 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •