CVE-2008-5419
EMC Control Center SST_CTGTRANS Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in SAN Manager Master Agent service (aka msragent.exe) in EMC Control Center 5.2 SP5 and 6.0 allows remote attackers to execute arbitrary code via multiple SST_CTGTRANS requests.
Desbordamiento de búfer basado en pila en SAN Manager Master Agent service (antes conocido como msragent.exe) en EMC Control Center v5.2 SP5 and v6.0 permite a atacantes remotos ejecutar código a su elección a través de la ejecución de código a través de múltiples peticiones SST_CTGTRANS.
This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of EMC Control Center. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the Master Agent service (msragent.exe) which listens by default on TCP port 10444. While processing SST_CTGTRANS requests the process copies packet data into a fixed length stack buffer. Exploitation allows for arbitrary code execution under the context of the SYSTEM user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-11-20 CVE Published
- 2008-12-10 CVE Reserved
- 2024-01-30 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://osvdb.org/50031 | Vdb Entry | |
http://securityreason.com/securityalert/4710 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/498555/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/32389 | Vdb Entry | |
http://www.securitytracker.com/id?1021262 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/3220 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-08-075 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46751 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/32801 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Emc Search vendor "Emc" | Control Center Search vendor "Emc" for product "Control Center" | 5.2 Search vendor "Emc" for product "Control Center" and version "5.2" | sp5 |
Affected
| ||||||
Emc Search vendor "Emc" | Control Center Search vendor "Emc" for product "Control Center" | 6.0 Search vendor "Emc" for product "Control Center" and version "6.0" | - |
Affected
|