
Preface: The DCE/RPC protocol is the protocol for remote procedure calls. It is widely used in the modern Internet. Because the proper functioning of DCE/RPC protocols is critical to modern infrastructure and society, it is important to verify the reliability of DCE/RPC implementations.
Background: This type of vulnerability can be particularly dangerous because it could allow an attacker to write data outside of the allocated memory buffer, potentially leading to remote code execution. Such a vulnerability could provide an attacker with unauthorized control of vCenter Server, posing a significant risk to the security and integrity of the virtualized environment managed by vCenter.
Vulnerability details:
CVE-2024-37079: vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
CVE-2024-37080: vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
Official announcement: For detail, please refer to link –