Posted by malvuln on Jan 19

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/74e65773735f977185f6a09f1472ea46.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Email-Worm.Win32.Agent.gi
Vulnerability: Remote Stack Buffer Overflow – (UDP Datagram)
Description: Creates a service “Microsoft ASPI Manager” and listens on
TCP ports 80, 81 and UDP 53. The service process is a dropped
executable named…
Read More – Full Disclosure


By |2021-01-19T18:24:36+00:00January 19th, 2021|