EMC Replication Manager irccd.exe RunProgram Message Handling Arbitrary Command Execution

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

Arbitrary code can be executed on the remote host.

Description :

The remote host is running EMC Replication Manager Client Control

The remote version of this software is affected by a remote command
execution vulnerability.

An unauthenticated attacker can exploit this flaw by sending a
specially crafted packet to the remote host. Successful exploitation
would result in remote code execution with the privileges of the
daemon itself.

See also :


Solution :

Install EMC Replication Manager patch as described on the EMC support
website. The following EMC products resolve this issue :

- EMC Replication Manager 5.0 SP6 Security Patch
- EMC Replication Manager 5.1 SP6 Security Patch
- EMC Replication Manager 5.2 Security Patch
- EMC Replication Manager 5.2 SP1 Security Patch

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 40849 ()

Bugtraq ID: 35998


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now