[NT] EMC Legato Networker Remote Exec Service Stack Overflow Vulnerabilities
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 27 Aug 2007 16:29:33 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
EMC Legato Networker Remote Exec Service Stack Overflow Vulnerabilities
Vulnerabilities allow remote attackers to execute arbitrary code on
vulnerable installations of EMC Networker. Authentication is not required
to exploit this vulnerability.
* Networker version 7.x.x
The specific flaws exist in the Networker Remote Exec Service,
nsrexecd.exe. The location of this service is available by querying the
SUNRPC portmapper on TCP port 111 for service #0x5f3e1, version 1. When
supplying a long invalid subcmd to a poll or a kill request, an
exploitable stack overflow vulnerability can occur within a call to
EMC has issued updates to correct this vulnerability. More details can be
found in knowledge base article esg83899 available from powerlink.emc.com.
EMC customers can further contact EMC Software Technical Support at
2007.02.23 - Vulnerability reported to vendor
2007.08.16 - Digital Vaccine released to TippingPoint customers
2007.08.20 - Coordinated public release of advisory
The information has been provided by <mailto:zdi-disclosures@xxxxxxxx>
The Zero Day Initiative (ZDI).
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [TOOL] CORE GRASP for PHP - Web-Application Protection Software
- Next by Date: [NEWS] Wireshark DNP3 Dissector Infinite Loop Vulnerability
- Previous by thread: [TOOL] CORE GRASP for PHP - Web-Application Protection Software
- Next by thread: [NEWS] Wireshark DNP3 Dissector Infinite Loop Vulnerability