|
|
| |
| WinRadius is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. |
| |
Credit:
The information has been provided by demonalex(at)163(dot)com .
The original article can be found at: http://www.securityfocus.com/bid/53702
|
| |
Vulnerable Systems:
* WinRadius WinRadius 2009
Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks may cause denial-of-service conditions.
Vendor Status:
Currently we are not aware of any vendor-supplied patches.
Disclosure Timeline:
Initial Release: May 28 2012
|
|
blog comments powered by
|