Posted by malvuln on Jan 19
Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/74e65773735f977185f6a09f1472ea46.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Email-Worm.Win32.Agent.gi
Vulnerability: Remote Stack Buffer Overflow – (UDP Datagram)
Description: Creates a service “Microsoft ASPI Manager” and listens on
TCP ports 80, 81 and UDP 53. The service process is a dropped
executable named…
– Read More – Full Disclosure