what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

EMC NetWorker Buffer Overflow

EMC NetWorker Buffer Overflow
Posted Oct 16, 2017
Authored by Aaron Portnoy | Site emc.com

EMC NetWorker Server contains a buffer overflow vulnerability that could potentially be exploited by malicious users to compromise the affected system. Versions prior to 8.2.4.9, 9.0.x (all supported versions), prior to 9.1.1.3, and prior to 9.2.0.4 are affected.

tags | advisory, overflow
advisories | CVE-2017-8022
SHA-256 | 369450dcc54bb4e682d177bc26e40df0e16897100df6e263e0947a432e6a9ef8

EMC NetWorker Buffer Overflow

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

ESA-2017-122: EMC NetWorker Buffer Overflow Vulnerability

EMC Identifier: ESA-2017-122

CVE Identifier: CVE-2017-8022

Severity Rating: CVSSv3 Base Score: 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected products:
* EMC NetWorker versions prior to 8.2.4.9
* EMC NetWorker versions 9.0.x (all supported versions)
* EMC NetWorker versions prior to 9.1.1.3
* EMC NetWorker versions prior to 9.2.0.4

Summary:
EMC NetWorker Server contains a buffer overflow vulnerability that could potentially be exploited by malicious users to compromise the affected system.

Details:
EMC NetWorker Server service (nsrd) is affected by a buffer overflow vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to execute arbitrary code on vulnerable installations of the software, or cause a denial of service, depending on the target system's platform.

Resolution:
The following EMC NetWorker Server releases contain resolution to this vulnerability:
* EMC NetWorker versions 8.2.4.9 and later
* EMC NetWorker version 9.1.1.3 and later
* EMC NetWorker version 9.2.0.4 and later

EMC recommends all customers upgrade to one of the above EMC NetWorker versions at the earliest opportunity. Customers are advised to follow security best practices and configure NetWorker Server to only accept requests from known hosts. See EMC NetWorker Security Configuration Guide for more information.

Link to remedies:

Customers can download software from: https://support.emc.com/downloads/1095_NetWorker

Credit:
EMC would like to thank Aaron Portnoy of Exodus Intelligence for reporting this vulnerability.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJZ5PDSAAoJEHbcu+fsE81ZI44IAI9Rk5oRvSeDFMLiv+1Cd/yL
RJEFCysNHGJzwVkz/XOXJLuE9ZxW6YgLfCxowT6WnLcslZVeBsSbNZBV7QJ3XPy5
hasBhaEfxc/8WoPhLOIbgbwW01ISAQfTAf2yEtX5jjddumnaDEBBbcdCdSKRFcbA
BfEIkXPWUXPDYx1k8tvfYWN09wWkfiA5QF0h3I8qGE/bygKpGzc5kv4bcZhbNXVf
TyyXYYFkmzfYqqqYf2LmAdbxzbWeNl7LAEVr7cxm6U23dlonNklW0wkOJDe1Ufgm
ehH99RALnao1glZHX2wgyAR4lf7awdIDeSxNJwlbKjwJUUX6vX6IYwM6laIF3IU=
=QPBw
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close