CVE-2008-5419 – EMC Control Center SST_CTGTRANS Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2008-5419
Stack-based buffer overflow in SAN Manager Master Agent service (aka msragent.exe) in EMC Control Center 5.2 SP5 and 6.0 allows remote attackers to execute arbitrary code via multiple SST_CTGTRANS requests. Desbordamiento de búfer basado en pila en SAN Manager Master Agent service (antes conocido como msragent.exe) en EMC Control Center v5.2 SP5 and v6.0 permite a atacantes remotos ejecutar código a su elección a través de la ejecución de código a través de múltiples peticiones SST_CTGTRANS. This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of EMC Control Center. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Master Agent service (msragent.exe) which listens by default on TCP port 10444. While processing SST_CTGTRANS requests the process copies packet data into a fixed length stack buffer. • http://osvdb.org/50031 http://secunia.com/advisories/32801 http://securityreason.com/securityalert/4710 http://www.securityfocus.com/archive/1/498555/100/0/threaded http://www.securityfocus.com/bid/32389 http://www.securitytracker.com/id?1021262 http://www.vupen.com/english/advisories/2008/3220 http://www.zerodayinitiative.com/advisories/ZDI-08-075 https://exchange.xforce.ibmcloud.com/vulnerabilities/46751 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-3684 – EMC ApplicationXtender Workflow Server Admin Agent Heap Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2008-3684
Heap-based buffer overflow in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to execute arbitrary code via crafted packet data to TCP port 2606. Desbordamiento de búfer basado en pila en el servicio Admin Agent en el servidor en EMC Documentum ApplicationXtender Workflow, posiblemente v5.40 SP1 y anteriores, permite a atacantes remotos ejecutar código arbitrario a través de paquete de datos manipulado al puerto 2606. This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of EMC ApplicationXtender Workflow Server. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Admin Agent service (aws_tmxn.exe) which listens by default on TCP port 2606. The process receives network packet data into a static heap buffer. • http://secunia.com/advisories/37070 http://www.zerodayinitiative.com/advisories/ZDI-08-096 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-3685 – EMC ApplicationXtender Workflow Server Admin Agent Arbitrary File Upload Vulnerability
https://notcve.org/view.php?id=CVE-2008-3685
Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to upload arbitrary files, and execute arbitrary code, via directory traversal sequences in requests to TCP port 2606. Vulnerabilidad de salto de directorio en aws_tmxn.exe en el servicio Admin Agent en el servidor en EMC Documentum ApplicationXtender Workflow, posiblemente v5.40 SP1 y anteriores, permite a atacantes remotos subir ficheros arbitrarios y ejecutar código de forma arbitraria a través de secuencias de salto de directorio en peticiones al puerto TCP 2606. This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of EMC ApplicationXtender Workflow Server. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Admin Agent service (aws_tmxn.exe) which listens by default on TCP port 2606. The process exposes functionality to upload arbitrary files to the remote system. • http://secunia.com/advisories/37070 http://www.zerodayinitiative.com/advisories/ZDI-08-095 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2008-3370 – EMC Centera Universal Access 4.0_4735.p4 - 'Username' SQL Injection
https://notcve.org/view.php?id=CVE-2008-3370
SQL injection vulnerability in the CUA Login Module in EMC Centera Universal Access (CUA) 4.0_4735.p4 allows remote attackers to execute arbitrary SQL commands via the user (user name) field. Vulnerabilidad de inyección SQL en CUA Login Module en EMC Centera Universal Access (CUA) 4.0_4735.p4, permite a atacantes remotos ejecutar comandos SQL de su elección a través del campo "user" (usuario). • https://www.exploit-db.com/exploits/32113 http://marc.info/?l=full-disclosure&m=121684757516717&w=2 http://secunia.com/advisories/31215 http://securityreason.com/securityalert/4066 http://www.securityfocus.com/bid/30358 http://www.securitytracker.com/id?1020540 http://www.vupen.com/english/advisories/2008/2219/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43981 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2008-3290
https://notcve.org/view.php?id=CVE-2008-3290
retroclient.exe in EMC Dantz Retrospect Backup Client 7.5.116 allows remote attackers to cause a denial of service (daemon crash) via a series of long packets containing 0x00 characters to TCP port 497 that trigger memory corruption, probably involving an English product version on a Chinese OS version. retroclient.exe en EMC Dantz Retrospect Backup Client 7.5.116 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) mediante una serie de paquetes largos que contienen caracteres 0x00 al puerto TCP 497 que dispara corrupción de memoria, involucrando probablemente una versión de producto inglesa en una versión del sistema operativo china. • http://kb.dantz.com/display/2/articleDirect/index.asp?aid=9692&r=0.5160639 http://secunia.com/advisories/31186 http://securityreason.com/securityalert/4024 http://www.fortiguardcenter.com/advisory/FGA-2008-16.html http://www.securityfocus.com/archive/1/494564/100/0/threaded http://www.securityfocus.com/bid/30306 http://www.vupen.com/english/advisories/2008/2150/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43928 • CWE-399: Resource Management Errors •