Vulnerability Details : CVE-2011-0900
Stack-based buffer overflow in the tsc_launch_remote function (src/support.c) in Terminal Server Client (tsclient) 0.150, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a .RDP file with a long hostname argument.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2011-0900
Probability of exploitation activity in the next 30 days: 7.77%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-0900
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2011-0900
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0900
-
http://www.securityfocus.com/bid/46099
Terminal Server Client '.rdp' File Processing Remote Denial of Service VulnerabilityExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/65100
Terminal Server Client hostname buffer overflow CVE-2011-0900 Vulnerability Report
-
http://www.exploit-db.com/exploits/16095
Terminal Server Client - '.rdp' Denial of Service - Linux dos ExploitExploit
Products affected by CVE-2011-0900
- cpe:2.3:a:erick_woods:terminal_server_client:0.150:*:*:*:*:*:*:*