iDefense Security Advisory 03.02.06 - The EWC Dantz Retrospect 7 backup client listens on TCP port 497 for commands from the central backup server. Sending a specially crafted malformed packet to this socket can force the backup client to terminate. This allows for an unauthenticated attacker to effectively disable the network backup services for a target network. This exploit has been tested with the Dantz Retrospect Client version 7.0.107. This is the latest available on the vendor's website.
ee09b829927318cb0d643d65ab7a8f4b0a4efc12e65ae4c5dc139bf66276e176