CVE-2007-3618
EMC Legato Networker Remote Exec Service Stack Overflow Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in the NetWorker Remote Exec Service (nsrexecd.exe) in EMC Software NetWorker 7.x.x allows remote attackers to execute arbitrary code via a (1) poll or (2) kill request with a "long invalid subcmd."
Desbordamiento de búfer basado en pila en el Servicio de Ejecución Remota NetWorker (nsrexecd.exe) en EMC Software NetWorker 7.x.x permite a atacantes remotos ejecutar código de su elección mediante (1) un sondeo o (2) una petición de terminación (kill) con un "subcmd inválido largo".
These vulnerabilities allow remote attackers to execute arbitrary code on vulnerable installations of EMC Networker. Authentication is not required to exploit this vulnerability.
The specific flaws exist in the Networker Remote Exec Service, nsrexecd.exe. The location of this service is available by querying the SUNRPC portmapper on TCP port 111 for service #0x5f3e1, version 1. When supplying a long invalid subcmd to a poll or a kill request, an exploitable stack overflow vulnerability can occur within a call to sprintf().
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-07-06 CVE Reserved
- 2007-08-20 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://osvdb.org/39744 | Vdb Entry | |
http://securityreason.com/securityalert/3043 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/477172/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2007/2931 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-07-049.html | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36123 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/26517 | 2018-10-15 | |
http://www.securityfocus.com/bid/25375 | 2018-10-15 | |
http://www.securitytracker.com/id?1018590 | 2018-10-15 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Emc Search vendor "Emc" | Legato Networker Search vendor "Emc" for product "Legato Networker" | 7.0 Search vendor "Emc" for product "Legato Networker" and version "7.0" | - |
Affected
| ||||||
Emc Search vendor "Emc" | Legato Networker Search vendor "Emc" for product "Legato Networker" | 7.1.3 Search vendor "Emc" for product "Legato Networker" and version "7.1.3" | - |
Affected
| ||||||
Emc Search vendor "Emc" | Legato Networker Search vendor "Emc" for product "Legato Networker" | 7.2 Search vendor "Emc" for product "Legato Networker" and version "7.2" | - |
Affected
| ||||||
Emc Search vendor "Emc" | Legato Networker Search vendor "Emc" for product "Legato Networker" | 7.2.1 Search vendor "Emc" for product "Legato Networker" and version "7.2.1" | - |
Affected
| ||||||
Emc Search vendor "Emc" | Legato Networker Search vendor "Emc" for product "Legato Networker" | 7.3.2 Search vendor "Emc" for product "Legato Networker" and version "7.3.2" | - |
Affected
|