[原文]Desktop Rover 3.0, and possibly earlier versions, allows remote attackers to cause a denial of service (application crash) via a crafted packet to TCP port 61427, which causes an invalid memory access.
Neslo Desktop Rover contains a flaw that may allow a remote denial of service. The issue is triggered when a remote attacker sends a specially-crafted malformed packet to TCP port 61427 resulting in a loss of availability of the application.
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s):
Restricting access to the Desktop Rover port (TCP Port 61427) will reduce the risk of this vulnerability being exploited.