Impact
Terminal Services Manager 3.1 contains a stack-based buffer overflow in the computer names field. An attacker can craft a malicious input file that, when processed by the Add Computers wizard, overwrites the structured exception handling pointer and executes arbitrary code such as calc.exe. The flaw allows local users to gain code execution on the host system.
Affected Systems
The affected product is Terminal Services Manager version 3.1 from Lizardsystems. No other vendors or versions are listed. The vulnerability applies to all installations of this software that have not applied any vendor patch.
Risk and Exploitability
The CVSS score of 8.6 indicates a high severity, and the vulnerability is exploitable locally by anyone who can create or supply a malicious file. Although the EPSS score is not available, the lack of KEV listing suggests no known active exploitation campaigns. Attackers would need local access to the machine and would trigger the flaw by opening the crafted file through the wizard, leading to full code execution.
OpenCVE Enrichment