The best practice for installations of EMC Replication Manager is to register a Replication Manager Client (irccd.exe) instance with the appropiate Replication Manager Server (ird.exe) as soon as the client software is installed on a host. Registration is performed by Replication Manager administrators from within the Replication Manager Server. In the time span exposed before registering a Replication Manager Client instance with a Replication Manager Server, the RunProgram function of the Replication Manager Client instance can be invoked with arbitrary arguments by remote unauthenticated attackers in order to execute arbitrary code with SYSTEM privileges on the vulnerable machine. This module exploits this misconfiguration scenario in order to install an agent on machines running still unregistered instances of EMC Replication Manager Client.
This module exploits a format string vulnerability in EMC NetWorker sending a crafted package to nsrd RPC service.
This module exploits a remote code execution vulnerability in EMC Data Protection Advisor (DAP). Vulnerable installations of EMC DPA exposes the EJBInvokerServlet invoker servlet which does not require any type of authentication by default on certain profiles and allow remote attackers to invoke MBean methods and execute arbitrary code.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing EMC AutoStart. A remote user can send specially crafted data to TCP port 8045 to trigger a stack overflow and execute arbitrary code on the target system.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing EMC AlphaStor. A remote user can send specially crafted data to TCP port 41025 to trigger a stack overflow and execute arbitrary code on the target system.
This module exploits a buffer overflow vulnerability in in the Library Control Program (LCP) in EMC AlphaStor. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/3500.
The Device Manager service (rrobotd.exe) in EMC AlphaStor is prone to an OS command injection vulnerability when processing DCP commands. A remote unauthenticated attacker can exploit this in order to execute arbitrary code with SYSTEM privileges on the vulnerable machine.
This module exploits a buffer overflow vulnerability in EMC AlphaStor. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/3000.
This module exploits a remote PHP code injection vulnerability in Elastix PBX by uploading a renamed PHP file and leveraging a local file inclusion vulnerability to execute the PHP file. It also exploits a bad configuration in the /etc/sudoers file to elevate privileges from 'asterisk' user to 'root'.
An internal memory buffer may be overrun while handling crafted "RMD" command. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the persftps.exe process.
Pagination
- Previous page
- Page 63
- Next page