The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Buffer Overflow Vulnerability in Winlpd


<< Previous INDEX Search src / Print Next >>
Date: 27 Jul 2006 11:02:29 -0000
From: [email protected]
To: [email protected]
Subject: Buffer Overflow Vulnerability in Winlpd
X-Virus-Scanned: antivirus-gw at tyumen.ru

Pablo Isola has discovered a vulnerability in Winlpd, which can be exploited by malicious people to compromise a vulnerable system. 


The vulnerability is caused due to a boundary error when handling received requests. This can be exploited to cause a stack-based buffer overflow by passing an overly long string in a request to the service (port 515/tcp).

Successful exploitation allows execution of arbitrary code.


The vulnerability has been confirmed in version 1.26. Other versions may also be affected.


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру