Multiple buffer overflows in Tomahawk SteelArrow prior to 4.5 allow remote malicious users to execute arbitrary code via (1) the Steelarrow Service (Steelarrow.exe) using a long UserIdent Cookie header, (2) DLLHOST.EXE (Steelarrow.dll) via a request for a long .aro file, or (3) DLLHOST.EXE via a Chunked Transfer-Encoding request.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tomahawk technologies steelarrow 4.1 |