![]() ![]() ![]() Vendor Information, Solutions and Workarounds All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27ĥ.The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. RouterOS is MikroTik's stand-alone operating system based on Linux v3.3.5 kernel.Ī buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. MikroTik now provides hardware and software for Internet connectivity in most of the countries around the world. MikroTik is a Latvian company which was founded in 1996 to develop routers and wireless ISP systems. Vulnerability InformationĬlass: Stack-based Buffer Overflow Title: MikroTik RouterOS SMB Buffer Overflow ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |