SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   EMC AutoStart Vendors:   EMC
EMC AutoStart Insecure Communication Method Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1032237
SecurityTracker URL:  http://securitytracker.com/id/1032237
CVE Reference:   CVE-2015-0538   (Links to External Site)
Date:  May 4 2015
Impact:   Execution of arbitrary code via network, Modification of system information, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.4.3 and prior, 5.5.0 and prior
Description:   A vulnerability was reported in EMC AutoStart. A remote user can execute arbitrary code on the target system.

The system uses insecure communication between the nodes of an AutoStart cluster. A remote user with knowledge of the Autostart domain name and the node list can send specially crafted data to the AutoStart agent 'ftagent.exe' to inject packets and execute arbitrary code on the target system. The code will run with the privileges of the target service (i.e., root or System).

An anonymous researcher (via US-CERT), Aniway.Anyway (at) gmail (dot) com and Anonymous (via HP's Zero Day Initiative), and Brian Gorenc of HP's Zero Day Initiative independently reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix (5.5.0.508 (HF4); Advisory ESA-2015-084).
Vendor URL:  www.emc.com/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (2003)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC