A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote malicious user to exploit it. All architectures and all devices running RouterOS prior to 6.41.3/6.42rc27 are vulnerable.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mikrotik routeros |
||
mikrotik routeros 6.4.2 |
In the second quarter of 2017, Kaspersky’s Global Research and Analysis Team (GReAT) began publishing summaries of the quarter’s private threat intelligence reports in an effort to make the public aware of the research we have been conducting. This report serves as the next installment, focusing on the relevant activities that we observed during Q1 2018. These summaries serve as a representative snapshot of what has been discussed in greater detail in our private reports, in order to highlig...