Vulnerable Systems:
* NetSupport Manager for Linux v11.00 and prior
NetSupport Manager for Solaris v9.50 and prior
NetSupport Manager for Mac OS X v11.00 and prior
Immune Systems:
* Netsupport Manager for Windows v11.00
The application fails to validate user supplied data before copying it into a limited buffer. As a result, it is possible to exploit this flaw to execute arbitrary code within the context of the affected application or cause Denial of Service. In detail, during the NetSupport s binary protocol handshake, the control component announces itself to the agent.
In the first packet, a field containing the control hostname is used without boundary checks. Successful exploitation against Linux/Unix and Mac platforms results in full access with root privileges.
Patch Availability:
this vulnerability is still unpatched. In the meantime, users can either disable the service or allow access from a specific IP only.