[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Buffer overflow vulnerability in Net4Switch via an overly long string passed to the Alert() method

ID: oval:org.secpod.oval:def:7001Date: (C)2012-09-24   (M)2022-10-10
Class: VULNERABILITYFamily: windows




The host is installed with ASUS Net4Switch 1.0.0020 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long string passed to the Alert() method. Successful exploitation could allow attackers to execute arbitrary code.

Platform:
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product:
ASUS Net4Switch
Reference:
CVE-2012-4924
CVE    1
CVE-2012-4924
CPE    2
cpe:/a:asus:net4switch:1.0.0020
cpe:/a:asus:net4switch

© SecPod Technologies