Vulnerabilities > CVE-2008-3290 - Resource Management Errors vulnerability in EMC Dantz Retrospect Backup Client 7.5.116
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
retroclient.exe in EMC Dantz Retrospect Backup Client 7.5.116 allows remote attackers to cause a denial of service (daemon crash) via a series of long packets containing 0x00 characters to TCP port 497 that trigger memory corruption, probably involving an English product version on a Chinese OS version.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Misc. |
NASL id | RETROSPECT_CLIENT_ESA_08_009.NASL |
description | According to its version number, the Retrospect Backup Client installed on the remote host is affected by several vulnerabilities : - An error in the client may lead to memory corruption and in turn a denial of service condition when processing specially crafted packets, although only when an English client is used on a Chinese operating system, which is not a supported configuration. - The password hash is sent over the network unencrypted, which could result in its disclosure. - A NULL pointer dereference error may lead to a denial of service condition. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 33561 |
published | 2008-07-23 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/33561 |
title | Retrospect Backup Client Multiple Vulnerabilities (ESA-08-009) |
code |
|
References
- http://kb.dantz.com/display/2/articleDirect/index.asp?aid=9692&r=0.5160639
- http://kb.dantz.com/display/2/articleDirect/index.asp?aid=9692&r=0.5160639
- http://secunia.com/advisories/31186
- http://secunia.com/advisories/31186
- http://securityreason.com/securityalert/4024
- http://securityreason.com/securityalert/4024
- http://www.fortiguardcenter.com/advisory/FGA-2008-16.html
- http://www.fortiguardcenter.com/advisory/FGA-2008-16.html
- http://www.securityfocus.com/archive/1/494564/100/0/threaded
- http://www.securityfocus.com/archive/1/494564/100/0/threaded
- http://www.securityfocus.com/bid/30306
- http://www.securityfocus.com/bid/30306
- http://www.vupen.com/english/advisories/2008/2150/references
- http://www.vupen.com/english/advisories/2008/2150/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43928
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43928