‘EMC NetWorker Denial of Service Vulnerability’

Summary

A resource exhaustion vulnerability exists throughout multiple EMC products through an exploited RPC interface.’

Credit:

‘The information has been provided by FortiGuard Global Security Research Team.
The original article can be found at: http://www.fortiguardcenter.com/advisory/FGA-2008-23.html


Details

Vulnerable Systems:
 * NetWorker Server, Storage Node and Client 7.3.x and 7.4, 7.4.1, 7.4.2
 * NetWorker Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier
 * NetWorker Module for Microsoft Exchange 5.1 and earlier
 * NetWorker Module for Microsoft Applications 2.0 and earlier
 * NetWorker Module for Meditech 2.0 and earlier
 * NetWorker PowerSnap 2.4 SP1 and earlier

Immune Systems:
 * NetWorker Server, Storage Node and Client 7.4 SP3
 * NetWorker Server, Storage Node and Client 7.3 SP4 build 565
 * NetWorker Client and Storage Node for Open VMS 7.3.2 ECO7
 * NetWorker Module for Microsoft Exchange 5.1 SP1
 * NetWorker Module for Microsoft Applications 2.1
 * NetWorker Module for Meditech 2.0 SP1
 * NetWorker PowerSnap 2.4 SP2

The RPC interface used by the affected EMC products does not properly enforce bounds checking on a parameter which is used to allocate memory on the heap. The vulnerable NetWorker products use the process ‘nsrexecd.exe’. A remote attacker can exploit this by repeatedly sending requests to the RPC interface, each time allocating more and more memory. Eventually system resources will be exhausted, and denial of service is achieved.

Solutions:
Use the solution provided by EMC http://powerlink.emc.com/

Categories: Windows