‘EMC NetWorker Denial of Service Vulnerability’
Summary
‘
Credit:
‘The information has been provided by FortiGuard Global Security Research Team.
The original article can be found at: http://www.fortiguardcenter.com/advisory/FGA-2008-23.html‘
Details
‘Vulnerable Systems:
* NetWorker Server, Storage Node and Client 7.3.x and 7.4, 7.4.1, 7.4.2
* NetWorker Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier
* NetWorker Module for Microsoft Exchange 5.1 and earlier
* NetWorker Module for Microsoft Applications 2.0 and earlier
* NetWorker Module for Meditech 2.0 and earlier
* NetWorker PowerSnap 2.4 SP1 and earlier
Immune Systems:
* NetWorker Server, Storage Node and Client 7.4 SP3
* NetWorker Server, Storage Node and Client 7.3 SP4 build 565
* NetWorker Client and Storage Node for Open VMS 7.3.2 ECO7
* NetWorker Module for Microsoft Exchange 5.1 SP1
* NetWorker Module for Microsoft Applications 2.1
* NetWorker Module for Meditech 2.0 SP1
* NetWorker PowerSnap 2.4 SP2
The RPC interface used by the affected EMC products does not properly enforce bounds checking on a parameter which is used to allocate memory on the heap. The vulnerable NetWorker products use the process ‘nsrexecd.exe’. A remote attacker can exploit this by repeatedly sending requests to the RPC interface, each time allocating more and more memory. Eventually system resources will be exhausted, and denial of service is achieved.
Solutions:
Use the solution provided by EMC http://powerlink.emc.com/‘