TippingPoint Zero Day Initiative

(0day) EMC Replication Manager Client irccd.exe Remote Code Execution Vulnerability

ZDI-11-061: February 7th, 2011


CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 8028. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the EMC Replication Manager Client. Authentication is not required to exploit this vulnerability.

The Replication Manager client installs a service binds the irccd.exe process to TCP port 6542. This service accepts commands using an XML-based protocol. It exposes a vulnerability through it's RunProgram functionality. By abusing this function an attacker can execute arbitrary code under the context of currently logged in user.

Vendor Response

EMC states:

April 4, 2011:
EMC released the update for Networker Module for Microsoft Applications.
Advisory can be found at:

February 7, 2011:
EMC has stated that this vulnerability has been fixed in EMC Replication Manager version 5.3 available through EMC Powerlink. However, the bug is still present in the EMC Networker Module for Microsoft Applications. It will be fixed in these products at a later date. EMC has released Security Advisory ESA-2011-004 to address this issue (covering CVE-2011-0647).

Disclosure Timeline

    2009-10-27 - Vulnerability reported to vendor
    2011-02-07 - Coordinated public release of advisory


This vulnerability was discovered by: