Vulnerability Description
Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realflex | Realwin | 1.06 |
Related Weaknesses (CWE)
References
- http://aluigi.org/adv/realwin_1-adv.txtExploit
- http://secunia.com/advisories/41849Vendor Advisory
- http://www.exploit-db.com/exploits/15259Exploit
- http://www.exploit-db.com/exploits/15337Exploit
- http://www.securityfocus.com/bid/44150Exploit
- http://aluigi.org/adv/realwin_1-adv.txtExploit
- http://secunia.com/advisories/41849Vendor Advisory
- http://www.exploit-db.com/exploits/15259Exploit
- http://www.exploit-db.com/exploits/15337Exploit
- http://www.securityfocus.com/bid/44150Exploit
FAQ
What is CVE-2010-4142?
CVE-2010-4142 is a vulnerability with a CVSS score of 10.0 (HIGH). Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCP...
How severe is CVE-2010-4142?
CVE-2010-4142 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4142?
Check the references section above for vendor advisories and patch information. Affected products include: Realflex Realwin.