Vulnerabilities > CVE-2006-2391 - Remote Buffer Overflow vulnerability in EMC Dantz Retrospect Backup Client
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in EMC Retrospect Client 5.1 through 7.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet to port 497. Failed exploit attempts will likely crash the application, denying further service to legitimate users.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Nessus
NASL family | Gain a shell remotely |
NASL id | RETROSPECT_CLIENT_OVERFLOW.NASL |
description | According to its version number, the installed instance of Retrospect client is susceptible to a buffer overflow attack that can be triggered by a packet starting with a specially crafted sequence of bytes. An unauthenticated, remote attacker may be able to exploit this flaw to execute code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21327 |
published | 2006-05-05 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21327 |
title | EMC Retrospect Client Packet Handling Remote Overflow |
References
- http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9511
- http://secunia.com/advisories/20080
- http://securitytracker.com/id?1016063
- http://securitytracker.com/id?1016136
- http://www.acrossecurity.com/aspr/ASPR-2006-05-17-1-PUB.txt
- http://www.kb.cert.org/vuls/id/186944
- http://www.securityfocus.com/archive/1/434726/100/0/threaded
- http://www.securityfocus.com/bid/17948
- http://www.securityfocus.com/bid/18064
- http://www.vupen.com/english/advisories/2006/1766
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26380