{"cve": [{"lastseen": "2018-10-16T10:51:39", "bulletinFamily": "NVD", "description": "Multiple heap-based buffer overflows in EMC RepliStor 6.2 SP2, and possibly earlier versions, allow remote attackers to execute arbitrary code via crafted compressed data.", "modified": "2018-10-15T17:53:14", "published": "2008-02-20T19:44:00", "id": "CVE-2007-6426", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6426", "title": "CVE-2007-6426", "type": "cve", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:NONE/"}}, {"lastseen": "2016-09-03T11:41:16", "bulletinFamily": "NVD", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6426. Reason: This candidate is a duplicate of CVE-2007-6426. Notes: All CVE users should reference CVE-2007-6426 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "modified": "2008-09-10T21:13:53", "published": "2008-02-20T19:44:00", "id": "CVE-2008-6426", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-6426", "title": "CVE-2008-6426", "type": "cve", "cvss": {"score": 0.0, "vector": "NONE"}}], "seebug": [{"lastseen": "2017-11-19T21:58:24", "bulletinFamily": "exploit", "description": "BUGTRAQ ID: 27915\r\nCVE(CAN) ID: CVE-2008-6426\r\n\r\nEMC RepliStor\u662f\u5b9e\u65f6\u5bb9\u707e\u5907\u4efd\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nEMC RepliStor\u5904\u7406\u7578\u5f62\u8bf7\u6c42\u6570\u636e\u65f6\u5b58\u5728\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u80fd\u5229\u7528\u6b64\u6f0f\u6d1e\u63a7\u5236\u670d\u52a1\u5668\u3002\r\n\r\nEMC RepliStor\u4e2d\u8d1f\u8d23\u6267\u884c\u538b\u7f29\u7684\u4ee3\u7801\u672a\u7ecf\u8003\u8651\u76ee\u6807\u7f13\u51b2\u533a\u7684\u5927\u5c0f\u4fbf\u89e3\u538b\u4e86\u6570\u636e\uff0c\u8fd9\u53ef\u80fd\u89e6\u53d1\u5806\u6ea2\u51fa\uff0c\u5bfc\u81f4\u4ee5RepliStor Server\u6216Control Server\u7684\u6743\u9650\uff08\u901a\u5e38\u4e3aSYSTEM\uff09\u6267\u884c\u4efb\u610f\u6307\u4ee4\u3002\u653b\u51fb\u8005\u65e0\u9700\u8ba4\u8bc1\u4fbf\u53ef\u4ee5\u89e6\u53d1\u8fd9\u4e9b\u6f0f\u6d1e\uff0c\u4f46\u5fc5\u987b\u8981\u80fd\u591f\u8fde\u63a5\u5230\u76ee\u6807\u670d\u52a1\u5668\u7684TCP 7144\u62167145\u7aef\u53e3\u3002\r\n\r\n\n\nEMC RepliStor 6.2 SP2\n \u5382\u5546\u8865\u4e01\uff1a\r\n\r\nEMC\r\n---\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=http://powerlink.emc.com/ target=_blank>http://powerlink.emc.com/</a>", "modified": "2008-02-23T00:00:00", "published": "2008-02-23T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-2929", "id": "SSV:2929", "title": "EMC RepliStor\u8fdc\u7a0b\u5806\u6ea2\u51fa\u6f0f\u6d1e", "type": "seebug", "sourceData": "", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": ""}], "nessus": [{"lastseen": "2019-02-21T01:11:28", "bulletinFamily": "scanner", "description": "According to its version, the installation of EMC RepliStor Server on the remote host is affected by multiple heap overvlow vulnerabilities. By sending a specially crafted request, an unauthorized attacker could execute arbitrary code with SYSTEM level privileges.", "modified": "2018-07-10T00:00:00", "id": "EMC_REPLISTOR_MULTIPLE.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=35467", "published": "2009-01-27T00:00:00", "title": "EMC RepliStor Multiple Remote Heap Based Buffer Overflows", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\nif (NASL_LEVEL < 3207) exit(0);\n\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(35467);\n script_version(\"1.9\");\n\n script_cve_id(\"CVE-2007-6426\");\n script_bugtraq_id(27915);\n\n script_name(english:\"EMC RepliStor Multiple Remote Heap Based Buffer Overflows\");\n script_summary(english:\"Checks version of EMC RepliStor\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote software is affected by multiple vulnerabilities.\" );\n script_set_attribute(attribute:\"description\", value:\n\"According to its version, the installation of EMC RepliStor Server on\nthe remote host is affected by multiple heap overvlow vulnerabilities. \nBy sending a specially crafted request, an unauthorized attacker could\nexecute arbitrary code with SYSTEM level privileges.\" );\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?dade10b4\" );\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to RepliStor 6.1 SP5 / 6.2 SP4 or later.\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2009/01/27\");\n script_cvs_date(\"Date: 2018/07/10 14:27:33\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"remote\");\nscript_end_attributes();\n\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Gain a shell remotely\");\n script_copyright(english:\"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.\");\n script_dependencies(\"emc_replistor.nbin\");\n script_require_keys(\"EMC/RepliStor/Version\");\n script_require_ports(7144);\n\n exit(0);\n}\n\nver = get_kb_item(\"EMC/RepliStor/Version\");\nif (!ver) exit(0);\n\nport = 7144;\n\n# Exit on version 6.1 SP5 / 6.2 SP4\n# Version 6.1 SP2 (Build 450b)\n\nmatches = eregmatch(string:ver, pattern:\"^Version ([0-9]+)\\.([0-9]+) (SP([0-9])+ )?\\(Build ([0-9a-z]+)\\)$\");\nif (!isnull(matches))\n{\n ver_major = int(matches[1]);\n ver_minor = int(matches[2]);\n sp = int(matches[4]);\n build = matches[5];\n\n if (\n (ver_major < 6) ||\n (ver_major == 6 && ver_minor == 1 && sp < 5) ||\n (ver_major == 6 && ver_minor == 2 && sp < 4) \n )\n security_hole(port);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:NONE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:25", "bulletinFamily": "software", "description": "iDefense Security Advisory 02.19.08\r\nhttp://labs.idefense.com/intelligence/vulnerabilities/\r\nFeb 19, 2008\r\n\r\nI. BACKGROUND\r\n\r\nEMC RepliStor is a data backup and recovery application for Windows. For\r\nmore information, visit the vendor's website at the following URL.\r\n\r\nhttp://software.emc.com/products/software_az/replistor.htm\r\n\r\nII. DESCRIPTION\r\n\r\nRemote exploitation of multiple heap overflow vulnerabilities in EMC\r\nCorp.'s RepliStor could allow an unauthenticated attacker to execute\r\narbitrary code with SYSTEM privileges.\r\n\r\nMultiple vulnerabilities exist within the code responsible for\r\ncompression. In each case, data is decompressed without consideration\r\nfor the size of the destination buffer. This results in an exploitable\r\nheap overflow.\r\n\r\nIII. ANALYSIS\r\n\r\nExploitation of these vulnerabilities results in the execution of\r\narbitrary code with the privileges of the RepliStor Server or Control\r\nServer, usually SYSTEM. In order to exploit these vulnerabilities, an\r\nattacker needs to be able to connect to the targeted server on TCP port\r\n7144 or 7145. No authentication is required to reach the vulnerable code\r\npaths.\r\n\r\nIV. DETECTION\r\n\r\niDefense has confirmed the existence of these vulnerabilities in EMC\r\nRepliStor version 6.2 SP2. Previous versions may also be affected.\r\n\r\nV. WORKAROUND\r\n\r\niDefense is currently unaware of any effective workaround for this\r\nissue.\r\n\r\nVI. VENDOR RESPONSE\r\n\r\n"EMC has issued updates to address this issue. EMC customers can view\r\nmore details on http://powerlink.emc.com/ by searching the knowledge\r\nbase for support solution emc179808 or they can contact EMC Software\r\nTechnical Support at 1-877-534-2867."\r\n\r\nVII. CVE INFORMATION\r\n\r\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\r\nname CVE-2008-6426 to this issue. This is a candidate for inclusion in\r\nthe CVE list (http://cve.mitre.org/), which standardizes names for\r\nsecurity problems.\r\n\r\nVIII. DISCLOSURE TIMELINE\r\n\r\n12/18/2007 Initial vendor notification\r\n12/18/2007 Initial vendor response\r\n02/19/2008 Coordinated public disclosure\r\n\r\nIX. CREDIT\r\n\r\nThis vulnerability was reported to iDefense by Stephen Fewer of Harmony\r\nSecurity (www.harmonysecurity.com).\r\n\r\nGet paid for vulnerability research\r\nhttp://labs.idefense.com/methodology/vulnerability/vcp.php\r\n\r\nFree tools, research and upcoming events\r\nhttp://labs.idefense.com/\r\n\r\nX. LEGAL NOTICES\r\n\r\nCopyright \u00a9 2008 iDefense, Inc.\r\n\r\nPermission is granted for the redistribution of this alert\r\nelectronically. It may not be edited in any way without the express\r\nwritten consent of iDefense. If you wish to reprint the whole or any\r\npart of this alert in any other medium other than electronically,\r\nplease e-mail customerservice@idefense.com for permission.\r\n\r\nDisclaimer: The information in the advisory is believed to be accurate\r\nat the time of publishing based on currently available information. Use\r\nof the information constitutes acceptance for use in an AS IS condition.\r\n There are no warranties with regard to this information. Neither the\r\nauthor nor the publisher accepts any liability for any direct,\r\nindirect, or consequential loss or damage arising from use of, or\r\nreliance on, this information.", "modified": "2008-02-22T00:00:00", "published": "2008-02-22T00:00:00", "id": "SECURITYVULNS:DOC:19244", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:19244", "title": "iDefense Security Advisory 02.19.08: EMC RepliStor Multiple Heap Overflow Vulnerabilities", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}]}