|CVSS SCORE||10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)|
Unified Service Monitor
|TREND MICRO CUSTOMER PROTECTION||Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11466. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
The flaw exists within the brstart.exe service which listens by default on TCP port 9002. When handling the authentication portion of a SMARTS request the process extracts a user provided value to allocate a buffer via sm_read_string_length then blindly copies user supplied data into this buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the service.
Cisco has issued an update to correct this vulnerability. More details can be found at:
EMC has issued an update to correct this vulnerability. More details can be found at: