gsd-2008-6219
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier, Module for Microsoft Exchange 5.1 and earlier, Module for Microsoft Applications 2.0 and earlier, Module for Meditech 2.0 and earlier, and PowerSnap 2.4 SP1 and earlier does not properly control the allocation of memory, which allows remote attackers to cause a denial of service (memory exhaustion) via multiple crafted RPC requests.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2008-6219", "description": "nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier, Module for Microsoft Exchange 5.1 and earlier, Module for Microsoft Applications 2.0 and earlier, Module for Meditech 2.0 and earlier, and PowerSnap 2.4 SP1 and earlier does not properly control the allocation of memory, which allows remote attackers to cause a denial of service (memory exhaustion) via multiple crafted RPC requests.", "id": "GSD-2008-6219" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-6219" ], "details": "nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier, Module for Microsoft Exchange 5.1 and earlier, Module for Microsoft Applications 2.0 and earlier, Module for Meditech 2.0 and earlier, and PowerSnap 2.4 SP1 and earlier does not properly control the allocation of memory, which allows remote attackers to cause a denial of service (memory exhaustion) via multiple crafted RPC requests.", "id": "GSD-2008-6219", "modified": "2023-12-13T01:23:02.181573Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6219", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier, Module for Microsoft Exchange 5.1 and earlier, Module for Microsoft Applications 2.0 and earlier, Module for Meditech 2.0 and earlier, and PowerSnap 2.4 SP1 and earlier does not properly control the allocation of memory, which allows remote attackers to cause a denial of service (memory exhaustion) via multiple crafted RPC requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20081022 FGA-2008-23:EMC NetWorker Denial of Service Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497645/100/0/threaded" }, { "name": "emc-networker-nsrexecd-dos(46035)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46035" }, { "name": "20081022 Re: FGA-2008-23:EMC NetWorker Denial of Service Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497666/100/0/threaded" }, { "name": "31866", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31866" }, { "name": "1021095", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021095" }, { "name": "32383", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32383" }, { "name": "http://www.fortiguardcenter.com/advisory/FGA-2008-23.html", "refsource": "MISC", "url": "http://www.fortiguardcenter.com/advisory/FGA-2008-23.html" }, { "name": "ADV-2008-2894", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2894" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:emc:networker_storage_node:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_client:7.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_storage_node:*:eco6:open_vms:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.3.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_module:*:-:microsoft_exchange:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_server:7.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_server:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_server:*:sp3:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_storage_node:*:sp3:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_powersnap:*:sp1:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_storage_node:7.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_storage_node:7.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_client:*:sp3:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_client:*:eco6:open_vms:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.3.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_server:7.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_client:7.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_client:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_module:*:-:microsoft_applications:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emc:networker_module:*:-:meditech:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6219" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier, Module for Microsoft Exchange 5.1 and earlier, Module for Microsoft Applications 2.0 and earlier, Module for Meditech 2.0 and earlier, and PowerSnap 2.4 SP1 and earlier does not properly control the allocation of memory, which allows remote attackers to cause a denial of service (memory exhaustion) via multiple crafted RPC requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "1021095", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1021095" }, { "name": "http://www.fortiguardcenter.com/advisory/FGA-2008-23.html", "refsource": "MISC", "tags": [], "url": "http://www.fortiguardcenter.com/advisory/FGA-2008-23.html" }, { "name": "31866", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/31866" }, { "name": "32383", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32383" }, { "name": "ADV-2008-2894", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/2894" }, { "name": "emc-networker-nsrexecd-dos(46035)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46035" }, { "name": "20081022 Re: FGA-2008-23:EMC NetWorker Denial of Service Vulnerability", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/497666/100/0/threaded" }, { "name": "20081022 FGA-2008-23:EMC NetWorker Denial of Service Vulnerability", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/497645/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-11T20:57Z", "publishedDate": "2009-02-20T17:30Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…