EMC Retrospect Client Packet Handling Remote Overflow

This script is Copyright (C) 2006-2012 Tenable Network Security, Inc.


Synopsis :

It is possible to execute code on the remote backup client.

Description :

According to its version number, the installed instance of Retrospect
client is susceptible to a buffer overflow attack that can be
triggered by a packet starting with a specially crafted sequence of
bytes.

An unauthenticated, remote attacker may be able to exploit this flaw to
execute code on the remote host.

See also :

http://www.acrossecurity.com/aspr/ASPR-2006-05-17-1-PUB.txt
http://www.securityfocus.com/archive/1/434726/100/0/threaded
http://kb.dantz.com/article.asp?article=9511&p=2

Solution :

Upgrade to a newer version of Retrospect Client.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Gain a shell remotely

Nessus Plugin ID: 21327 ()

Bugtraq ID: 17948
18064

CVE ID: CVE-2006-2391