vendor:
Remote Control
by:
chap0
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Remote Control
Affected Version From: 8
Affected Version To: 9.5
Patch Exists: NO
Related CWE:
CPE: a:netop:remote_control:8.0, cpe:/a:netop:remote_control:9.1, cpe:/a:netop:remote_control:9.2, cpe:/a:netop:remote_control:9.5
Platforms Tested: Windows XP SP3
2011
NetOp Remote Control Buffer Overflow
This exploit takes advantage of a buffer overflow vulnerability in NetOp Remote Control software versions 8.0, 9.1, 9.2, and 9.5. It allows an attacker to execute arbitrary code on a target system. The vulnerability is caused by a lack of proper input validation in the software's handling of certain files. By sending a specially crafted file, an attacker can trigger a buffer overflow and overwrite critical memory, leading to code execution. The exploit includes a payload that establishes a reverse TCP shell connection to the attacker's machine. This allows the attacker to gain remote access to the target system.
Mitigation:
Upgrade to Version 10 of NetOp Remote Control to fix the vulnerability. Additionally, it is recommended to keep all software and systems up to date with the latest security patches.