iDefense Security Advisory 04.15.10 – Remote exploitation of a stack-based buffer overflow vulnerability within AgentX++, as distributed with multiple vendors’ products, allows attackers to execute arbitrary code with the privileges of the AgentX master process. This vulnerability exists within the AgentX::receive_agentx function. By sending multiple blocks of data to the vulnerable function, an attacker could overwrite the data following the stack buffer, including the saved return address.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/88519/04.15.10-1.txt
Source: https://packetstormsecurity.com/files/88519/iDEFENSE-Security-Advisory-2010-04-15.1.html

