CVE-2008-5420
EMC Control Center SST_SENDFILE Remote File Retrieval Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The SAN Manager Master Agent service (aka msragent.exe) in EMC Control Center before 6.1 does not properly authenticate SST_SENDFILE requests, which allows remote attackers to read arbitrary files.
El servicio SAN Manager Master Agent (alias msragent.exe)en EMC Control Center anterior 6.1 no autentica adecuadamente peticiones SST_SENDFILE, las cuales permiten a atacantes remotos leer archivos de su elección.
This vulnerability allows remote attackers to retrieve arbitrary files on systems with vulnerable installations of EMC Control Center. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the Master Agent service (msragent.exe) which listens by default on TCP port 10444. While processing SST_SENDFILE requests the service does not validate the requestor allowing any remote attacker to download arbitrary files.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-11-20 CVE Published
- 2008-12-10 CVE Reserved
- 2024-01-30 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://osvdb.org/50032 | Vdb Entry | |
http://securityreason.com/securityalert/4709 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/498556/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/32392 | Vdb Entry | |
http://www.securitytracker.com/id?1021263 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/3220 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-08-076 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46753 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/32801 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Emc Search vendor "Emc" | Control Center Search vendor "Emc" for product "Control Center" | <= 6.0 Search vendor "Emc" for product "Control Center" and version " <= 6.0" | - |
Affected
| ||||||
Emc Search vendor "Emc" | Control Center Search vendor "Emc" for product "Control Center" | 5.2 Search vendor "Emc" for product "Control Center" and version "5.2" | sp5 |
Affected
|