URSoft.W32Dasm.Function.Buffer.Overflow
Description
This indicates an attempt to exploit a buffer-overflow vulnerability in W32Dasm, a disassembler/debugger developed by URSoft.
The program uses the wsprintf() function to copy the name of the
imported/exported functions of the analyzed file into a buffer of only
256 bytes, with the possibility for an attacker to execute malicious
code.
Affected Products
W32Dasm 8.93 and earlier version.
Operating system : windows xp sp0.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently, we are not aware of any patch officially released by the vendor for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-12-03 | 16.973 | Sig Added |
2020-08-18 | 15.907 | Sig Added |
2020-07-22 | 15.892 | Sig Added |