CVE-2020-37205
Buffer Overflow in RemShutdown 2.9.0.0 Causes DoS Crash
Publication date: 2026-02-11
Last updated on: 2026-02-20
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nsasoft | remshutdown | 2.9.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2020-37205 is a denial of service vulnerability in RemShutdown version 2.9.0.0 caused by a buffer overflow in the 'Name' registration field."}, {'type': 'paragraph', 'content': 'An attacker can input a crafted payload of about 1000 characters into this field, which overflows the buffer and causes the application to crash.'}, {'type': 'paragraph', 'content': 'This vulnerability arises from improper handling of input length in the registration name field.'}] [1, 2]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "The primary impact of this vulnerability is a denial of service condition where the RemShutdown application crashes when processing a specially crafted input in the 'Name' registration field."}, {'type': 'paragraph', 'content': 'This crash can disrupt normal operations of the software, potentially causing downtime or interruption of services that depend on RemShutdown.'}, {'type': 'paragraph', 'content': 'The vulnerability does not affect confidentiality or integrity, only availability.'}] [2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to reproduce the denial of service condition on the RemShutdown 2.9.0.0 application. Specifically, a crafted payload of approximately 1000 characters (e.g., 1000 "A" characters) can be input into the \'Name\' registration field to see if the application crashes.'}, {'type': 'paragraph', 'content': "A practical detection method involves running a script that generates a payload file and then pasting the payload into the 'Name' field during registration to observe if the application crashes."}, {'type': 'paragraph', 'content': 'For example, a Python script can be used to create a file named "poc.txt" containing 1000 "A" characters, which can then be copied and pasted into the registration dialog\'s \'Name\' field.'}, {'type': 'paragraph', 'content': 'There are no specific network commands mentioned for detection since the attack is local and requires user interaction.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': "To mitigate this vulnerability, avoid inputting excessively long strings (around 1000 characters) into the 'Name' registration field of RemShutdown 2.9.0.0."}, {'type': 'paragraph', 'content': 'Since the vulnerability requires local user interaction, restricting access to the application and limiting who can perform registration actions can reduce risk.'}, {'type': 'paragraph', 'content': 'Check for updates or patches from the vendor (http://www.nsauditor.com/) that address this buffer overflow issue and apply them as soon as they become available.'}, {'type': 'paragraph', 'content': 'If no patch is available, consider using alternative software or running RemShutdown in a controlled environment to minimize impact.'}] [1, 2]