Overview
DameWare Mini Remote Control is a lightweight remote control intended primarily for administrators and help desks for management of desktop systems. A vulnerability in DameWare Mini Remote Control may permit an unauthenticated attacker to execute arbitrary code on the system.
Description
| A buffer overflow vulnerability has been discovered in versions of DameWare Mini Remote Control prior to 3.73. A remote attacker can send a specially crafted packet to the DameWare Mini Remote Control (default port 6129/TCP) to mimic a client and exploit this vulnerability against the server. Since the buffer overflow occurs in a section of the code used to handle authentication, a remote unauthenticated attacker can execute arbitrary code on the system. The CERT/CC has seen reports of active exploitation. | 
Impact
| An unauthenticated attacker can exploit this vulnerability to execute arbitrary code. | 
Solution
| This vulnerability is resolved in version 3.73 or higher. | 
| Block access to the DameWare Mini Remote Control Service port (default 6129/TCP) at the network perimeter. This will not mitigate attacks from within the firewall perimeter, but may mitigate attacks from outside your network. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
Wirepair has reported this vulnerability.
This document was written by Jason A Rafail.
Other Information
| CVE IDs: | None | 
| Severity Metric: | 29.77 | 
| Date Public: | 2003-12-14 | 
| Date First Published: | 2003-12-22 | 
| Date Last Updated: | 2003-12-22 21:16 UTC | 
| Document Revision: | 9 |