EMC.Retrospect.Client.Crafted.Packet.Buffer.Overflow

description-logoDescription

It indicates a possible exploit of buffer overflow vulnerability in EMC Retrospect.
This vulnerability is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.
This issue allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.

affected-products-logoAffected Products

EMC Corporation: Retrospect Client for Linux 6.5
EMC Corporation: Retrospect Client for Linux 7.0
EMC Corporation: Retrospect Client for Linux 7.5
EMC Corporation: Retrospect Client for Macintosh 5.1
EMC Corporation: Retrospect Client for Macintosh 6.1
EMC Corporation: Retrospect Client for NetWare 1.0
EMC Corporation: Retrospect Client for Solaris 6.5
EMC Corporation: Retrospect Client for Solaris 7.0
EMC Corporation: Retrospect Client for Solaris 7.5
EMC Corporation: Retrospect Client for Windows 6.5
EMC Corporation: Retrospect Client for Windows 7.0
EMC Corporation: Retrospect Client for Windows 7.5

Impact logoImpact

Execute arbitrary code

recomended-action-logoRecommended Actions

Refer to EMC Retrospect Knowledgebase Article 9511 for upgrade information.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)