URSoft.W32Dasm.Function.Buffer.Overflow

description-logoDescription

This indicates an attempt to exploit a buffer-overflow vulnerability in W32Dasm, a disassembler/debugger developed by URSoft.
The program uses the wsprintf() function to copy the name of the
imported/exported functions of the analyzed file into a buffer of only
256 bytes, with the possibility for an attacker to execute malicious
code.

affected-products-logoAffected Products

W32Dasm 8.93 and earlier version.
Operating system : windows xp sp0.

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently, we are not aware of any patch officially released by the vendor for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-12-03 16.973 Sig Added
2020-08-18 15.907 Sig Added
2020-07-22 15.892 Sig Added