Symantec PCAnywhere awhost32 Remote Code Execution Exploit

The flaw exists within the awhost32 component which is used when handling incoming connections. This process listens on TCP port 5631. When handling an authentication request the process copies the user supplied username unsafely to a fixed-length buffer.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Friday, February 3, 2012 - 00:00