Page 2 of 11 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 70EXPL: 0

The nsrpush process in the client in EMC NetWorker before 7.6.5.3 and 8.x before 8.0.1.4 sets weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors. El proceso nsrpush en el cliente en EMC NetWorker anterior a v7.6.5.3 y v8.x anterior a v8.0.1.4 fija permisos débiles para ficheros no especificados, permitiendo a usuarios locales ganar privilegios mediante vectores desconocidos. • http://archives.neohapsis.com/archives/bugtraq/2013-05/0013.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.0EPSS: 2%CPEs: 28EXPL: 0

librpc.dll in nsrexecd in EMC NetWorker before 7.5 SP4, 7.5.3.x before 7.5.3.5, and 7.6.x before 7.6.1.2 does not properly mitigate the possibility of a spoofed localhost source IP address, which allows remote attackers to (1) register or (2) unregister RPC services, and consequently cause a denial of service or obtain sensitive information from interprocess communication, via crafted UDP packets containing service commands. librpc.dll en nsrexecd de EMC NetWorker en versiones anteriores a 7.5 SP4, 7.5.3.x anteriores a 7.5.3.5, y 7.6.x anteriores a 7.6.1.2 no mitiga apropiadamente la posibilidad de suplantar una dirección IP de fuente localhost, lo que permite a atacantes remotos (1) registrar o (2) desregistrar servicios RPC, y consecuentemente provocar una denegación de servicio u obtener información confidencial de comunicación entre procesos ("interprocess communication") a través de paquetes UDP modificados que contengan comandos de servicio. This vulnerability allows remote attackers to register RPC services on vulnerable installations of EMC Legato Networker and IBM Informix Dynamic Server. Authentication is not required to exploit this vulnerability. The flaw exists within the librpc.dll component which listens by default on UDP port 111. When handling the pmap_set request the process verifies the source address is "127.0.0.1". This communication is via UDP and a valid source address is not required, a udp packet from source address "127.0.0.1" can be created sent to this service allowing a remote attacker to register and unregister RPC services. • http://archives.neohapsis.com/archives/bugtraq/2011-01/0162.html http://archives.neohapsis.com/archives/bugtraq/2011-01/att-0162/ESA-2011-003.txt http://secunia.com/advisories/43113 http://securitytracker.com/id?1025010 http://www.osvdb.org/70686 http://www.securityfocus.com/bid/46044 http://www.vupen.com/english/advisories/2011/0241 https://exchange.xforce.ibmcloud.com/vulnerabilities/64997 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 through 7.2 rely on AUTH_UNIX authentication, which relies on user ID for authentication and allows remote attackers to bypass authentication and gain privileges by spoofing a username or UID. • http://secunia.com/advisories/16464 http://secunia.com/advisories/16470 http://securitytracker.com/id?1014713 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1 http://www.kb.cert.org/vuls/id/606857 http://www.legato.com/support/websupport/product_alerts/081605_NW_authentication.htm http://www.osvdb.org/18800 http://www.securityfocus.com/bid/14582 https://exchange.xforce.ibmcloud.com/vulnerabilities/21887 •

CVSS: 7.5EPSS: 3%CPEs: 10EXPL: 0

EMC Legato NetWorker, Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 6.0 through 7.2 do not properly verify authentication tokens, which allows remote attackers to gain privileges by modifying an authentication token. • http://secunia.com/advisories/16464 http://secunia.com/advisories/16470 http://securitytracker.com/id?1014713 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1 http://www.kb.cert.org/vuls/id/407641 http://www.legato.com/support/websupport/product_alerts/081605_NW_token_authentication.htm http://www.osvdb.org/18801 http://www.securityfocus.com/bid/14582 https://exchange.xforce.ibmcloud.com/vulnerabilities/21892 •

CVSS: 6.4EPSS: 2%CPEs: 10EXPL: 0

The Legato PortMapper in EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 through 7.2 does not restrict access to the pmap_set and pmap_unset commands, which allows remote attackers to (1) cause a denial of service by using pmap_unset to un-register a NetWorker service, or (2) obtain sensitive information from NetWorker services by using pmap_set to register a new service. • http://secunia.com/advisories/16464 http://secunia.com/advisories/16470 http://securitytracker.com/id?1014713 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1 http://www.kb.cert.org/vuls/id/801089 http://www.legato.com/support/websupport/product_alerts/081605_NW_port_mapper.htm http://www.osvdb.org/18802 http://www.securityfocus.com/bid/14582 https://exchange.xforce.ibmcloud.com/vulnerabilities/21893 •