First published: Tue Nov 02 2010(Updated: )
Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealFlex RealWin | =1.06 | |
RealFlex RealWin | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4142 is considered to have a high severity due to the potential for remote code execution and denial of service.
To fix CVE-2010-4142, upgrade to the latest version of RealWin, which addresses the buffer overflow vulnerabilities.
CVE-2010-4142 affects DATAC RealWin versions 2.0 Build 6.1.8.10 and earlier.
CVE-2010-4142 can be exploited through crafted packets such as SCPC_INITIALIZE, SCPC_INITIALIZE_RF, or SCPC_TXTEVENT.
The impact of CVE-2010-4142 includes system crashes and the potential for remote attackers to execute arbitrary code.