A vulnerability in the authentication mechanism used by the Legato NetWorker Management Console may allow an attacker to execute arbitrary commands.
The EMC NetWorker (formerly Legato NetWorker) family of products provides solutions for backup and recovery of data. It includes the EMC NetWorker Management Console option which provides a Java-based interface for monitoring, administration, and reporting for NetWorker environments. The NetWorker Management Console configures and uses a weak form of authentication to connect to managed NetWorker backup servers. Any remote attacker with knowledge of this authentication mechanism could impersonate the NetWorker Management Console system and connect to the affected servers with root privileges.
A remote attacker may be able to execute arbitrary commands on a vulnerable system. The attacker-supplied commands would be executed with root privileges. Secondary impacts include, but are not limited to, compromise of backup archive integrity.
Apply an update
EMC has published patches to address this issue. Please see the Systems Affected section of this document for additional details.
Restrict access to the affected component
Users, particularly those who are unable to apply the patches, are encouraged to block access to ports 2638/tcp and 2638/udp at the network perimeter and on the host running the EMC NetWorker Management Console.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Notified: November 17, 2006 Updated: February 27, 2007
`Description of Problem:
The Management Console component of NetWorker uses an embedded database that
runs in a separate process on the Management Console server. Access to this
database process is restricted to authorized users, but a vulnerability has
been discovered that may allow unauthorized users to access the database
Users may apply NetWorker 7.3.2 Jumbo Update 1. This patch restricts how the
database can be accessed.
To access NetWorker 7.3.2 Jumbo Update 1, go to:
Then download the appropriate version for your environment.
A readme file is included in the ftp location.
Please read and utilize the information in this product alert to assist in
avoiding any situation that might arise from the problem(s) described herein.
If you have any questions regarding this product alert, please contact EMC
Software Technical Support at 1-877-534-2867.
The National Oceanic and Atmospheric Administration (NOAA) Computer Incident
Response Team (N-CIRT) is credited with the discovery of this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector
Base | |
Temporal | |
Environmental | |
Thanks to the National Oceanic and Atmospheric Administration (NOAA) Computer Incident Response Team (N-CIRT) Lab for reporting this issue.
This document was written by Chad R Dougherty.
CVE IDs: | CVE-2006-3892
Severity Metric: | 19.91
Date Public: | 2007-02-26
Date First Published: | 2007-03-02
Date Last Updated: | 2007-03-19 18:49 UTC
Document Revision: | 16