[NT] EMC Legato Networker Remote Exec Service Stack Overflow Vulnerabilities



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



EMC Legato Networker Remote Exec Service Stack Overflow Vulnerabilities
------------------------------------------------------------------------


SUMMARY

Vulnerabilities allow remote attackers to execute arbitrary code on
vulnerable installations of EMC Networker. Authentication is not required
to exploit this vulnerability.

DETAILS

Affected Products:
* Networker version 7.x.x

The specific flaws exist in the Networker Remote Exec Service,
nsrexecd.exe. The location of this service is available by querying the
SUNRPC portmapper on TCP port 111 for service #0x5f3e1, version 1. When
supplying a long invalid subcmd to a poll or a kill request, an
exploitable stack overflow vulnerability can occur within a call to
sprintf().

Vendor Response:
EMC has issued updates to correct this vulnerability. More details can be
found in knowledge base article esg83899 available from powerlink.emc.com.
EMC customers can further contact EMC Software Technical Support at
1-877-534-2867.

Disclosure Timeline:
2007.02.23 - Vulnerability reported to vendor
2007.08.16 - Digital Vaccine released to TippingPoint customers
2007.08.20 - Coordinated public release of advisory

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3618>
CVE-2007-3618


ADDITIONAL INFORMATION

The information has been provided by <mailto:zdi-disclosures@xxxxxxxx>
The Zero Day Initiative (ZDI).
The original article can be found at:
<http://www.zerodayinitiative.com/advisories/ZDI-07-049.html>
http://www.zerodayinitiative.com/advisories/ZDI-07-049.html



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NT] EMC DiskXtender Multiple Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... EMC DiskXtender is "a data backup and migration suite. ... Remote exploitation of an authentication bypass vulnerability in EMC ...
    (Securiteam)
  • [NT] EMC AlphaStor Library Manager Arbitrary Command Execution Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... EMC AlphaStor Library Manager Arbitrary Command Execution Vulnerability ...
    (Securiteam)
  • [UNIX] Trend Micro VirusWall Buffer Overflow in VSAPI Library
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... buffer overflow vulnerability in VSAPI library allows arbitrary code ... is called "vscan" which is set suid root by default. ... permissions and thus granted all local users the privilege to execute the ...
    (Securiteam)
  • [UNIX] SCO Multiple Local Buffer Overflow
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Local exploitation of a buffer overflow vulnerability in the ppp binary, ... allows attackers to gain root privileges. ...
    (Securiteam)
  • [NT] Microsoft Word 6.0/95 Document Converter Buffer Overflow (MS04-041)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... WordPad is "a word processing application that uses the MFC rich edit ... Remote exploitation of a buffer overflow vulnerability in Microsoft ... Microsoft Word format files into the Rich Text Format natively handled by ...
    (Securiteam)