Impact
Remote Process Explorer 1.0.0.16 contains a local buffer overflow that can be exploited by pasting a crafted string into the computer name textbox of the Add Computer dialog; the overflow corrupts the Structured Exception Handler chain and forces the application to crash when attempting a connection, causing a denial of service with no data compromise or remote code execution.
Affected Systems
The vulnerable product is Lizardsystems Remote Process Explorer version 1.0.0.16; no other versions are listed as affected.
Risk and Exploitability
The CVSS score of 6.9 marks this flaw as medium severity. EPSS is unavailable and the vulnerability is not in the CISA KEV catalog, implying limited current exploitation. The attack requires local access to the machine running the application, as the malicious payload is entered through a UI field. Because the effect is limited to an application crash, the impact is confined to availability of that specific instance of Remote Process Explorer.
OpenCVE Enrichment