Overview
EMC AutoStart, version 5.5.0 and earlier, is vulnerable to remote command execution via specially crafted packets.
Description
EMC AutoStart is an enterprise software application developed to help networks and service maintain a high level of availability. AutoStart can manage clusters of applications or nodes as well as single instances. Affected versions of EMC AutoStart fail to communicate securely between nodes, leading to the possibility of packet injection. Remote code execution with SYSTEM or root privileges is possible for attackers with knowledge of the AutoStart domain name. By sending crafted packets to the ftagent running on the remote system, it is possible to run commands to write and execute data to an absolute or relative file path on the remote system. |
Impact
A remote, unauthenticated user may be able to execute arbitrary commands with SYSTEM or root privileges. |
Solution
Apply an update |
Use a firewall to limit access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 9.3 | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Temporal | 8.4 | E:F/RL:W/RC:C |
Environmental | 6.3 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to the reporter who wishes to remain anonymous.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2015-0538 |
Date Public: | 2015-04-30 |
Date First Published: | 2015-04-30 |
Date Last Updated: | 2015-04-30 20:12 UTC |
Document Revision: | 38 |