|CVSS SCORE||9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)|
Unified Service Monitor
|TREND MICRO CUSTOMER PROTECTION||Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11467. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
The flaw exists within the brstart.exe service which listens by default on TCP port 9002. When handling an add_dm request the process uses a user provided value to allocate a buffer then blindly copies user supplied data into a fixed-length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the casuser user.
EMC has issued an update to correct this vulnerability. More details can be found at:
Cisco has issued an update to correct this vulnerability. More details can be found at: