|TREND MICRO CUSTOMER PROTECTION||Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 6051. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard StorageWorks Storage Mirroring. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the DoubleTake.exe process bound by default on TCP ports 1100, 1106 and UDP port 1105. During the handling of an encoded authentication request, the process copies the user-supplied login information into a fixed length stack buffer. Sending at least 256 bytes will trigger a stack based buffer overflow due to a vulnerable processing loop. Exploitation of this issue can result in arbitrary code execution.
To resolve this vulnerability download HP StorageWorks Storage Mirroring software v4.5 Service Pack 2 (SP2) from Double-Take at the following URL: http://www.doubletake.com/products/double-take/default.aspx
|CREDIT||Titon of BastardLabs