Intrusion Prevention

URSoft.W32Dasm.Function.Buffer.Overflow

Description

This indicates an attempt to exploit a buffer-overflow vulnerability in W32Dasm, a disassembler/debugger developed by URSoft.
The program uses the wsprintf() function to copy the name of the
imported/exported functions of the analyzed file into a buffer of only
256 bytes, with the possibility for an attacker to execute malicious
code.

Affected Products

W32Dasm 8.93 and earlier version.
Operating system : windows xp sp0.

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Currently, we are not aware of any patch officially released by the vendor for this issue.

CVE References

CVE-2005-0308