EMC Retrospect Client Packet Handling Overflow

Medium Nessus Network Monitor Plugin ID 3615

Synopsis

It is possible to execute code on the remote backup client.

Description

According to its version number, the installed instance of Retrospect client is vulnerable to a buffer overflow when it receives a packet starting with a specially-crafted sequence of bytes. An unauthenticated remote attacker may be able to exploit this flaw to execute code on the remote host.

Solution

Upgrade to version 6.5.140 ,7.0.112, 7.5.116 or higher.

See Also

http://www.acrossecurity.com/aspr/ASPR-2006-05-17-1-PUB.txt

http://www.securityfocus.com/archive/1/434726/100/0/threaded

http://www.kb.cert.org/vuls/id/186944

http://kb.dantz.com/article.asp?article=9511&p=2

http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9511&r=0.8686334

Plugin Details

Severity: Medium

ID: 3615

File Name: 3615.prm

Family: Generic

Published: 2006/05/11

Modified: 2016/01/21

Nessus ID: 21327

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 6.3

Temporal Score: 5.5

Vector: CVSS3#AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Reference Information

CVE: CVE-2006-2391

BID: 17948, 18064