CVE-2011-2738 – Cisco Unified Service Monitor brstart sm_read_string_length Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-2738
Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used in Unified Operations Manager before 8.6 and CiscoWorks LAN Management Solution 3.x and 4.x before 4.1; and multiple EMC Ionix products including Application Connectivity Monitor (Ionix ACM) 2.3 and earlier, Adapter for Alcatel-Lucent 5620 SAM EMS (Ionix ASAM) 3.2.0.2 and earlier, IP Management Suite (Ionix IP) 8.1.1.1 and earlier, and other Ionix products; allow remote attackers to execute arbitrary code via crafted packets to TCP port 9002, aka Bug IDs CSCtn42961 and CSCtn64922, related to a buffer overflow. Múltiples vulnerabilidades no especificadas en Unified Service Monitor de Cisco anterior a versión 8.6, tal y como es usado en Unified Operations Manager anterior a versión 8.6 y CiscoWorks LAN Management Solution versiones 3.x y 4.x anteriores a 4.1; y múltiples productos de Ionix de EMC, incluido Application Connectivity Monitor (Ionix ACM) versión 2.3 y versiones anteriores, Adapter for Alcatel-Lucent 5620 SAM EMS (Ionix ASAM) versión 3.2.0.2 y anteriores, IP Management Suite (Ionix IP) versión 8.1.1.1 y versiones anteriores, y otros productos Ionix; permiten a los atacantes remotos ejecutar código arbitrario por medio de paquetes diseñados al puerto TCP 9002, también se conoce como Bug IDs CSCtn42961 y CSCtn64922, relacionados con un desbordamiento de búfer. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Unified Service Monitor due to bundled EMC SMARTS application server. Authentication is not required to exploit this vulnerability. The flaw exists within the brstart.exe service which listens by default on TCP port 9002. When handling the authentication portion of a SMARTS request the process extracts a user provided value to allocate a buffer via sm_read_string_length then blindly copies user supplied data into this buffer on the heap. • http://secunia.com/advisories/45979 http://secunia.com/advisories/46016 http://secunia.com/advisories/46052 http://secunia.com/advisories/46053 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b9351e.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080b9351f.shtml http://www.osvdb.org/75442 http://www.securityfocus.com/archive/1/519646/100/0/threaded http://www.securityfocus.com/bid/49627 http://www.securityfocus.com/bid/49644 http:/ •
CVE-2011-1740
https://notcve.org/view.php?id=CVE-2011-1740
EMC Avamar 4.x, 5.0.x, and 6.0.x before 6.0.0-592 allows remote authenticated users to modify client data or obtain sensitive information about product activities by leveraging privileged access to a different domain. EMC Avamar v4.x, v5.0.x, y v6.0.x antes de v6.0.0-592 permite modificar los datos del cliente a usuarios remotos autenticados para obtener información confidencial sobre las actividades del producto, aprovechando el acceso privilegiado a un dominio diferente. • http://archives.neohapsis.com/archives/bugtraq/2011-09/0076.html http://secunia.com/advisories/45988 http://secunia.com/advisories/46002 http://securitytracker.com/id?1026035 https://exchange.xforce.ibmcloud.com/vulnerabilities/69760 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-2735 – EMC Autostart ftAgent Opcode 0x11 Parsing Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-2735
Multiple buffer overflows in EMC AutoStart 5.3.x and 5.4.x before 5.4.1 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted message over TCP. Múltiples desbordamientos de búfer en EMC AutoStart v5.3.x y v5.4.x antes de v5.4.1 permite a atacantes remotos causar una denegación de servicio (caída del demonio) o posiblemente ejecutar código de su elección mediante el envío de un mensaje manipulado a través de TCP. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC AutoStart. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Agent Service (ftAgent.exe). The Agent Service listens on TCP port 8045 for communications between AutoStart nodes. • http://secunia.com/advisories/45703 http://securityreason.com/securityalert/8352 http://securitytracker.com/id?1025958 http://www.securityfocus.com/archive/1/519371/100/0/threaded http://www.securityfocus.com/bid/49238 https://exchange.xforce.ibmcloud.com/vulnerabilities/69296 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-2733
https://notcve.org/view.php?id=CVE-2011-2733
EMC RSA Adaptive Authentication On-Premise (AAOP) 6.0.2.1 SP1 Patch 2, SP1 Patch 3, SP2, SP2 Patch 1, and SP3 does not prevent reuse of authentication information during a session, which allows remote authenticated users to bypass intended access restrictions via vectors related to knowledge of the originally used authentication information and unspecified other session information. EMC RSA Adaptive Authentication On-Premise (AAOP) v6.0.2.1 SP1 Patch2, SP1 Patch3, SP2, SP2 Patch1 y Service Pack 3 no impide la reutilización de la información de autenticación durante una sesión, lo que permite eludir las restricciones de acceso, a usuarios remotos autenticados, a través de vectores relacionados con el conocimiento de la información de autenticación utilizado originalmente y con información de sesión no especificada. • http://securityreason.com/securityalert/8344 http://www.securityfocus.com/archive/1/519346/100/0/threaded http://www.securityfocus.com/bid/49574 • CWE-287: Improper Authentication •
CVE-2011-1742
https://notcve.org/view.php?id=CVE-2011-1742
EMC Data Protection Advisor before 5.8.1 places cleartext account credentials in the DPA configuration file in unspecified circumstances, which might allow local users to obtain sensitive information by reading this file. EMC Data Protection Advisor anterior a v5.8.1 coloca credenciales de cuentas en texto claro en el fichero de configuración DPA en circunstancias no especificadas, lo que permite a usuarios locales obtener información sensible leyendo este fichero. • http://securityreason.com/securityalert/8318 http://www.securityfocus.com/archive/1/519012/100/0/threaded • CWE-255: Credentials Management Errors •