[NT] EMC RepliStor Server Heap Overflow Vulnerability



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



EMC RepliStor Server Heap Overflow Vulnerability
------------------------------------------------------------------------


SUMMARY

A vulnerability allows attackers to execute arbitrary code on vulnerable
installations of EMC RepliStor Server. User interaction is not required to
exploit this vulnerability.

DETAILS

The specific flaw exists in the RepliStor Server Service that listens by
default on TCP port 7144. The vulnerable function trusts a
user-supplied size value allowing an attacker to create an undersized
buffer. A later call to recv() overflows that buffer allowing for
arbitrary code execution in the context of the SYSTEM user.

Vendor Response:
EMC has issued updates to correct this vulnerability. More details can be
found in knowledge base article emc168869 available from
powerlink.emc.com. EMC customers can further contact EMC Software
Technical Support at 1-877-534-2867.

Disclosure Timeline:
2007.07.20 - Vulnerability reported to vendor
2007.10.09 - Digital Vaccine released to TippingPoint customers
2007.10.10 - Coordinated public release of advisory

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5323>
CVE-2007-5323


ADDITIONAL INFORMATION

The information has been provided by <mailto:TSRT@xxxxxxxx> TippingPoint.
The original article can be found at:
<http://dvlabs.tippingpoint.com/advisory/TPTI-07-18>
http://dvlabs.tippingpoint.com/advisory/TPTI-07-18



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [UNIX] Trend Micro VirusWall Buffer Overflow in VSAPI Library
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... buffer overflow vulnerability in VSAPI library allows arbitrary code ... is called "vscan" which is set suid root by default. ... permissions and thus granted all local users the privilege to execute the ...
    (Securiteam)
  • [UNIX] SCO Multiple Local Buffer Overflow
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Local exploitation of a buffer overflow vulnerability in the ppp binary, ... allows attackers to gain root privileges. ...
    (Securiteam)
  • [NT] Microsoft Word 6.0/95 Document Converter Buffer Overflow (MS04-041)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... WordPad is "a word processing application that uses the MFC rich edit ... Remote exploitation of a buffer overflow vulnerability in Microsoft ... Microsoft Word format files into the Rich Text Format natively handled by ...
    (Securiteam)
  • [NT] CA Multiple Product DBASVR RPC Server Multiple Buffer Overflow Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... This vulnerability allows remote attackers to execute arbitrary code on ... Backup, Enterprise Backup, Server Protection Suite and Business Protection ...
    (Securiteam)
  • [UNIX] Tikiwiki Command Injection and Arbitrary File Exposure Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Two security vulnerabilities have been recently discovered in Tikiwiki, ... Remote exploitation of an input validation vulnerability in Tikiwiki ... allows attackers to gain access to arbitrary files on the vulnerable ...
    (Securiteam)