Remote code execution signedness error exploit for librpc.dll as used by multiple vendors.
c94ca9ab119c818f298d83db5f00592c187b0dfc71cd86d00639b38db1bf22ba
Zero Day Initiative Advisory 10-023 - This vulnerability allows attackers to execute arbitrary code on vulnerable installations of both IBM Informix Dynamic Server and EMC Legato Networker. User interaction is not required to exploit this vulnerability. The specific flaw exists within the RPC protocol parsing library, librpc.dll, utilized by the ISM Portmapper service (portmap.exe) bound by default to TCP port 36890. During authentication, a lack of a proper signedness check on a supplied parameter size can result in exploitable stack based buffer overflow leading to arbitrary code execution under the context of the SYSTEM user.
aaeb74e2cc0ffffef2fdd611f181810d3fb06be0fc048c991c3f9b087c281335