Buffer overflow in Drive Control Program (DCP) in EMC AlphaStor 4.0 before build 814 allows remote attackers to execute arbitrary code via vectors involving a new device name.
Desbodamiento de búfer del Drive Control Program (DCP) en EMC AlphaStor v4.0 antes de v814 que permite a atacantes remotos ejecutar código arbitrario a través de vectores relacionados con un nuevo nombre de dispositivo.
This vulnerability potentially allows remote attackers to execute arbitrary code on vulnerable installations of EMC AlphaStor for EMC Networker. Authentication is not required to exploit this vulnerability.
The specific flaw exists within Device Manager (rrobotd.exe) which listens by default on port 3000. When parsing the 0x41 command, the process creates a file path using user-supplied data which can exceed the size of the stack buffer used, allowing an attacker partial control over memory. An attacker may be able to leverage this vulnerability into remote execution of arbitrary code as SYSTEM.