EMC Retrospect Client Packet Handling Overflow

medium Nessus Network Monitor Plugin ID 3615

Synopsis

It is possible to execute code on the remote backup client.

Description

According to its version number, the installed instance of Retrospect client is vulnerable to a buffer overflow when it receives a packet starting with a specially-crafted sequence of bytes. An unauthenticated remote attacker may be able to exploit this flaw to execute code on the remote host.

Solution

Upgrade to version 6.5.140 ,7.0.112, 7.5.116 or higher.

See Also

http://www.acrossecurity.com/aspr/ASPR-2006-05-17-1-PUB.txt

http://www.securityfocus.com/archive/1/434726/100/0/threaded

http://www.kb.cert.org/vuls/id/186944

http://kb.dantz.com/article.asp?article=9511&p=2

http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9511&r=0.8686334

Plugin Details

Severity: Medium

ID: 3615

Family: Generic

Published: 5/11/2006

Updated: 3/6/2019

Nessus ID: 21327

Risk Information

VPR

Risk Factor: Medium

Score: 5.3

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.5

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:emc:retrospect_client

Reference Information

CVE: CVE-2006-2391

BID: 17948, 18064