|Check Point Reference:||CPAI-2012-1284|
|Date Published:||5 Dec 2012|
|Protection Provided by:||
|Who is Vulnerable?|| EMC NetWorker 7.6.x prior to 220.127.116.11 |
EMC NetWorker 8.0.x prior to 18.104.22.168
|Vulnerability Description||A stack buffer overflow vulnerability has been reported in EMC NetWorker.|
|Vulnerability Details||The vulnerability is due to insufficient input validation. A remote attacker can exploit this vulnerability by sending a malicious SunRPC request to the target server. Successful exploitation of this vulnerability allows remote attackers to create a denial of service condition or inject and execute arbitrary code on the vulnerable system.|
This protection will detect and block malicious incoming requests.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: SUN-RPC Enforcement Protection
Attack Information: EMC NetWorker nsrd Stack Buffer Overflow