Unknown
DameWare Support Control fgets Vulnerability
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(1 user assessed)Unknown
(1 user assessed)Unknown
Unknown
Unknown
DameWare Support Control fgets Vulnerability
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Stack-based buffer overflow in the “Add from text file” feature in the DameWare Exporter tool (DWExporter.exe) in DameWare Remote Support 10.0.0.372, 9.0.1.247, and earlier allows user-assisted attackers to execute arbitrary code via unspecified vectors.
Add Assessment
Technical Analysis
Version analyzed: DameWare Support Control 10.0.0.372
Vulnerability is due to the insecure usage of fgetws
””
.text:0040D6AA push edi ; FILE *
.text:0040D6AB lea ecx, [esp+2234h+var_2010]
.text:0040D6B2 push 1FF0h ; int
.text:0040D6B7 push ecx ; wchar_t *
.text:0040D6B8 call _fgetws ; bof here!
Later also in a loop:
while ( fgetws(&v20, 8176, v3) );
Unfortunately, no success searching for valid UNICODE pointers for ppr:
!py mona seh -all , manual exam of the results, any UNICODE compliant pointer :
”`
Vulnerable function is protected by stack cookies.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
Products
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: