1 results (0.010 seconds)

CVSS: 10.0EPSS: 15%CPEs: 1EXPL: 0

Heap-based buffer overflow in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to execute arbitrary code via crafted packet data to TCP port 2606. Desbordamiento de búfer basado en pila en el servicio Admin Agent en el servidor en EMC Documentum ApplicationXtender Workflow, posiblemente v5.40 SP1 y anteriores, permite a atacantes remotos ejecutar código arbitrario a través de paquete de datos manipulado al puerto 2606. This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of EMC ApplicationXtender Workflow Server. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Admin Agent service (aws_tmxn.exe) which listens by default on TCP port 2606. The process receives network packet data into a static heap buffer. • http://secunia.com/advisories/37070 http://www.zerodayinitiative.com/advisories/ZDI-08-096 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •