Description
Remote Desktop Audit 2.3.0.157 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code during the Add Computers Wizard file import process. Attackers can craft a malicious payload file to trigger a structured exception handler (SEH) bypass and execute shellcode when importing computer lists.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
gurbanli
References
www.exploit-db.com/exploits/48465 (ExploitDB-48465)
lizardsystems.com/remote-desktop-audit/ (Remote Desktop Audit Product Webpage)
www.vulncheck.com/...emote-desktop-audit-buffer-overflow-seh (VulnCheck Advisory: Remote Desktop Audit 2.3.0.157 - Buffer Overflow (SEH))