ID CVE-2017-8022 Type cve Reporter cve@mitre.org Modified 2017-11-14T16:22:00
Description
An issue was discovered in EMC NetWorker (prior to 8.2.4.9, all supported 9.0.x versions, prior to 9.1.1.3, prior to 9.2.0.4). The Server service (nsrd) is affected by a buffer overflow vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to execute arbitrary code on vulnerable installations of the software, or cause a denial of service, depending on the target system's platform.
{"zdt": [{"lastseen": "2018-03-19T15:18:27", "description": "EMC NetWorker Server contains a buffer overflow vulnerability that could potentially be exploited by malicious users to compromise the affected system. Versions prior to 8.2.4.9, 9.0.x (all supported versions), prior to 9.1.1.3, and prior to 9.2.0.4 are affected.", "edition": 1, "published": "2017-10-18T00:00:00", "type": "zdt", "title": "EMC NetWorker Buffer Overflow Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2017-8022"], "modified": "2017-10-18T00:00:00", "href": "https://0day.today/exploit/description/28817", "id": "1337DAY-ID-28817", "sourceData": "EMC NetWorker Buffer Overflow Vulnerability\r\n\r\n\r\nCVE Identifier: CVE-2017-8022\r\n\r\nSeverity Rating: CVSSv3 Base Score: 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\r\n\r\nAffected products: \r\n* EMC NetWorker versions prior to 8.2.4.9\r\n* EMC NetWorker versions 9.0.x (all supported versions)\r\n* EMC NetWorker versions prior to 9.1.1.3 \r\n* EMC NetWorker versions prior to 9.2.0.4 \r\n\r\nSummary: \r\nEMC NetWorker Server contains a buffer overflow vulnerability that could potentially be exploited by malicious users to compromise the affected system.\r\n\r\nDetails: \r\nEMC NetWorker Server service (nsrd) is affected by a buffer overflow vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to execute arbitrary code on vulnerable installations of the software, or cause a denial of service, depending on the target system's platform. \r\n\r\nResolution: \r\nThe following EMC NetWorker Server releases contain resolution to this vulnerability:\r\n* EMC NetWorker versions 8.2.4.9 and later\r\n* EMC NetWorker version 9.1.1.3 and later\r\n* EMC NetWorker version 9.2.0.4 and later\r\n\r\nEMC recommends all customers upgrade to one of the above EMC NetWorker versions at the earliest opportunity. Customers are advised to follow security best practices and configure NetWorker Server to only accept requests from known hosts. See EMC NetWorker Security Configuration Guide for more information.\r\n\r\nLink to remedies:\r\n\r\nCustomers can download software from: https://support.emc.com/downloads/1095_NetWorker \r\n\r\nCredit:\r\nEMC would like to thank Aaron Portnoy of Exodus Intelligence for reporting this vulnerability.\n\n# 0day.today [2018-03-19] #", "sourceHref": "https://0day.today/exploit/28817", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-01T01:57:34", "description": "The version of EMC NetWorker installed on the remote Windows host is\nprior to 8.2.4.9 or 9.x prior to 9.1.1.3 or 9.2.x prior to\n9.2.0.4. It is, therefore, affected by a buffer overflow\nvulnerability. A remote, unauthenticated attacker may potentially\nexploit this vulnerability to execute arbitrary code or cause a\ndenial of service condition, depending on the target systems platform.", "edition": 28, "cvss3": {"score": 8.1, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-10-26T00:00:00", "title": "EMC NetWorker < 8.2.4.9 / 9.x < 9.1.1.3 / 9.2.x < 9.2.0.4", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-8022"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:emc:networker"], "id": "EMC_NETWORKER_ESA_2017_122.NASL", "href": "https://www.tenable.com/plugins/nessus/104178", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(104178);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\"CVE-2017-8022\");\n script_bugtraq_id(101551);\n\n script_name(english:\"EMC NetWorker < 8.2.4.9 / 9.x < 9.1.1.3 / 9.2.x < 9.2.0.4\");\n script_summary(english:\"Checks the version of EMC NetWorker.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has an application installed that is affected\nby a buffer overflow vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of EMC NetWorker installed on the remote Windows host is\nprior to 8.2.4.9 or 9.x prior to 9.1.1.3 or 9.2.x prior to\n9.2.0.4. It is, therefore, affected by a buffer overflow\nvulnerability. A remote, unauthenticated attacker may potentially\nexploit this vulnerability to execute arbitrary code or cause a\ndenial of service condition, depending on the target systems platform.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://seclists.org/fulldisclosure/2017/Oct/35\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to EMC NetWorker 8.2.4.9 / 9.1.1.3 / 9.2.0.4 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-8022\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/10/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/10/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/10/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:emc:networker\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"emc_networker_installed.nasl\");\n script_require_keys(\"installed_sw/EMC NetWorker\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nappname = \"EMC NetWorker\";\ninstall = get_single_install(app_name:appname, exit_if_unknown_ver:TRUE);\nversion = install['version'];\npath = install['path'];\nbuild = install['Build'];\nserver = install['Server'];\n\nif(server != 1) audit(AUDIT_INST_VER_NOT_VULN, \"EMC NetWorker Client\");\n\nfix = NULL;\nif (ver_compare(ver:version, fix:'8.2.4.9', strict:FALSE) < 0)\n fix = '8.2.4.9';\nelse if (version =~ \"^9\\.[0-1]\\.\" && ver_compare(ver:version, fix:'9.1.1.3', strict:FALSE) < 0)\n fix = '9.1.1.3';\nelse if (version =~ \"^9\\.2\\.\" && ver_compare(ver:version, fix:'9.2.0.4', strict:FALSE) < 0)\n fix = '9.2.0.4';\n\nif (isnull(fix))\n audit(AUDIT_INST_PATH_NOT_VULN, 'EMC NetWorker', version, path);\n\nport = get_kb_item('SMB/transport');\nif (!port) port = 445;\n\nreport =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\nsecurity_report_v4(port:port, extra:report, severity:SECURITY_WARNING);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}