[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-disclosure] FGA-2008-23:EMC NetWorker Denial of Service Vulnerability



FGA-2008-23:EMC NetWorker Denial of Service Vulnerability 
2008.October.21  
 
Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in 
EMC NetWorker  
 
Summary: 
 
A resource exhaustion vulnerability exists throughout multiple EMC products 
through an exploited RPC interface. 
 
Impact: 
 
Denial of service.  
 
Risk: 
 
Medium 
 
Affected Software: 
 
NetWorker Server, Storage Node and Client 7.4 SP3  
NetWorker Server, Storage Node and Client 7.3 SP4 build 565  
NetWorker Client and Storage Node for Open VMS 7.3.2 ECO7  
NetWorker Module for Microsoft Exchange 5.1 SP1  
NetWorker Module for Microsoft Applications 2.1  
NetWorker Module for Meditech 2.0 SP1  
NetWorker PowerSnap 2.4 SP2  
 
Additional Information: 
 
The RPC interface used by the affected EMC products does not properly enforce 
bounds checking on a parameter which is used to allocate memory on the heap. 
The vulnerable NetWorker products use the process "nsrexecd.exe". A remote 
attacker can exploit this by repeatedly sending requests to the RPC interface, 
each time allocating more and more memory. Eventually system resources will be 
exhausted, and denial of service is achieved.  
 
Solutions: 
 
Use the solution provided by EMC http://powerlink.emc.com/ 
The FortiGuard Global Security Research Team released a signature 
"EMC.Products.Malicious.Array.Count.DoS", which covers this specific 
vulnerability. 
 
Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) 
service should be protected against this resource exhaustion vulnerability. 
Fortinet’s IPS service is one component of FortiGuard Subscription Services, 
which also offer comprehensive solutions such as antivirus, Web content 
filtering and antispam capabilities. These services enable protection against 
threats on both application and network layers. FortiGuard Services are 
continuously updated by the FortiGuard Global Security Research Team, which 
enables Fortinet to deliver a combination of multi-layered security 
intelligence and true zero-day protection from new and emerging threats. These 
updates are delivered to all FortiGate, FortiMail and FortiClient products. 
Fortinet strictly follows responsible disclosure guidelines to ensure optimum 
protection during a threat's lifecycle.  
 
References: 
 
http://powerlink.emc.com/ 
http://www.fortiguardcenter.com/advisory/FGA-2008-23.html

Acknowledgement: 
 
Zhenhua Liu, Xiaopeng Zhang and Junfeng Jia of Fortinet's FortiGuard Global 
Security Research Team

*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/