Vulnerabilities > CVE-2006-2391 - Unspecified vulnerability in EMC Retrospect Client
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN emc
nessus
Summary
Buffer overflow in EMC Retrospect Client 5.1 through 7.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet to port 497.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Nessus
NASL family | Gain a shell remotely |
NASL id | RETROSPECT_CLIENT_OVERFLOW.NASL |
description | According to its version number, the installed instance of Retrospect client is susceptible to a buffer overflow attack that can be triggered by a packet starting with a specially crafted sequence of bytes. An unauthenticated, remote attacker may be able to exploit this flaw to execute code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21327 |
published | 2006-05-05 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21327 |
title | EMC Retrospect Client Packet Handling Remote Overflow |
References
- http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9511
- http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9511
- http://secunia.com/advisories/20080
- http://secunia.com/advisories/20080
- http://securitytracker.com/id?1016063
- http://securitytracker.com/id?1016063
- http://securitytracker.com/id?1016136
- http://securitytracker.com/id?1016136
- http://www.acrossecurity.com/aspr/ASPR-2006-05-17-1-PUB.txt
- http://www.acrossecurity.com/aspr/ASPR-2006-05-17-1-PUB.txt
- http://www.kb.cert.org/vuls/id/186944
- http://www.kb.cert.org/vuls/id/186944
- http://www.securityfocus.com/archive/1/434726/100/0/threaded
- http://www.securityfocus.com/archive/1/434726/100/0/threaded
- http://www.securityfocus.com/bid/17948
- http://www.securityfocus.com/bid/17948
- http://www.securityfocus.com/bid/18064
- http://www.securityfocus.com/bid/18064
- http://www.vupen.com/english/advisories/2006/1766
- http://www.vupen.com/english/advisories/2006/1766
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26380
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26380