lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 22 Oct 2008 14:04:42 +0800
From: "noreply-secresearch@...tinet.com"<noreply-secresearch@...tinet.com>
To: "full-disclosure" <full-disclosure@...ts.grok.org.uk>,
	"bugtraq" <bugtraq@...urityfocus.com>
Subject: FGA-2008-23:EMC NetWorker Denial of Service
	Vulnerability

FGA-2008-23:EMC NetWorker Denial of Service Vulnerability. 
2008.October.21 . 
. 
Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in EMC NetWorker . 
. 
Summary:. 
. 
A resource exhaustion vulnerability exists throughout multiple EMC products through an exploited RPC interface.. 
. 
Impact:. 
. 
Denial of service. . 
. 
Risk:. 
. 
Medium. 
. 
Affected Software:. 
. 
NetWorker Server, Storage Node and Client 7.4 SP3 . 
NetWorker Server, Storage Node and Client 7.3 SP4 build 565 . 
NetWorker Client and Storage Node for Open VMS 7.3.2 ECO7 . 
NetWorker Module for Microsoft Exchange 5.1 SP1 . 
NetWorker Module for Microsoft Applications 2.1 . 
NetWorker Module for Meditech 2.0 SP1 . 
NetWorker PowerSnap 2.4 SP2 . 
. 
Additional Information:. 
. 
The RPC interface used by the affected EMC products does not properly enforce bounds checking on a parameter which is used to allocate memory on the heap. The vulnerable NetWorker products use the process "nsrexecd.exe". A remote attacker can exploit this by repeatedly sending requests to the RPC interface, each time allocating more and more memory. Eventually system resources will be exhausted, and denial of service is achieved. . 
. 
Solutions:. 
. 
Use the solution provided by EMC http://powerlink.emc.com/. 
The FortiGuard Global Security Research Team released a signature "EMC.Products.Malicious.Array.Count.DoS", which covers this specific vulnerability.. 
. 
Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) service should be protected against this resource exhaustion vulnerability. Fortinet’s IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. . 
. 
References:. 
. 
http://powerlink.emc.com/. 
http://www.fortiguardcenter.com/advisory/FGA-2008-23.html

Acknowledgement:. 
. 
Zhenhua Liu, Xiaopeng Zhang and Junfeng Jia of Fortinet's FortiGuard Global Security Research Team

*** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient.  Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited.  If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists