CERTA-2007-AVI-375
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité de EMC Legato Networker permet l'exécution de code arbitraire à distance.
Description
Une vulnérabilité présente dans le service d'exécution à distance Networker Remote Exec Service permet à un utilisateur malveillant d'exécuter du code arbitraire à distance par le biais d'un dépassement de pile.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation). Les clients de EMC peuvent se référer au bulletin de sécurité de l'éditeur présent dans sa base de connaissance sous la référence esg83899.
NoneReferences
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Networker versions 7.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 pr\u00e9sente dans le service d\u0027ex\u00e9cution \u00e0 distance\nNetworker Remote Exec Service permet \u00e0 un utilisateur malveillant\nd\u0027ex\u00e9cuter du code arbitraire \u00e0 distance par le biais d\u0027un d\u00e9passement\nde pile.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation). Les clients de EMC peuvent se\nr\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pr\u00e9sent dans sa base de\nconnaissance sous la r\u00e9f\u00e9rence esg83899.\n",
"cves": [
{
"name": "CVE-2007-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3618"
}
],
"links": [
{
"title": "Base de connaissance de l\u0027\u00e9diteur EMC :",
"url": "https://powerlink.emc.com"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Zero Day Initiative ZDI-07-049 du 20 ao\u00fbt 2007 :",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-049.html"
}
],
"reference": "CERTA-2007-AVI-375",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-08-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 de EMC Legato Networker permet l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans EMC Legato Networker",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Zero Day Initiative ZDI-07-049 du 20 ao\u00fbt 2007",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…