{"vuid":"VU#136424","idnumber":"136424","name":"Remote Execute vulnerable to denial-of-service","keywords":["Remote Execute","DoS","denial of service","7 connections","tcp 2000"],"overview":"Remote Execute cannot handle more than seven connections simultaneously. If more than seven connections are attempted, Remote Execute will crash, resulting in a denial-of-service condition.","clean_desc":"Remote Execute is a network administration tool for the Windows platform that allows users to run applications remotely. Remote Execute contains a vulnerability that may allow a remote attacker to cause a denial-of-service condition. The flaw exists because Remote Execute cannot handle more than seven connections simultaneously. If seven or more connections are attempted, Remote Execute will crash.","impact":"A remote attacker may be able to crash Remote Execute resulting in a denial-of-service condition.","resolution":"Upgrade This issue was addressed in Remote Execute version 2.3.0.1.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Paul Craig.","author":"This document was written by Jeff Gennari.","public":["http://secunia.com/advisories/13389/","http://www.ibexsoftware.com/downloadRemoteExecute.asp"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-12-07T13:53:24Z","publicdate":"2004-12-06T00:00:00Z","datefirstpublished":"2004-12-10T17:13:11Z","dateupdated":"2004-12-10T20:19:03Z","revision":30,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"17","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"7","cam_impact":"3","cam_easeofexploitation":"15","cam_attackeraccessrequired":"10","cam_scorecurrent":"1.18125","cam_scorecurrentwidelyknown":"1.3584375","cam_scorecurrentwidelyknownexploited":"2.5396875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.18125,"vulnote":null}