Advisory Details

May 26th, 2015

Dell NetVault Backup Heap Buffer Overflow Remote Code Execution Vulnerability

ZDI-15-240
ZDI-CAN-2606

CVE ID CVE-2015-4067
CVSS SCORE 9.3, (AV:N/AC:M/Au:N/C:C/I:C/A:C)
AFFECTED VENDORS Dell
AFFECTED PRODUCTS NetVault Backup
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 19454. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dell NetVault Backup. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the libnv6 module. By manipulating a serialized object's template string specifiers, an attacker can cause an integer overflow resulting in an undersized allocation and eventually a heap overflow. An attacker can leverage this vulnerability to execute code under the context of SYSTEM.

VENDOR RESPONSE Dell has issued an update to correct this vulnerability. More details can be found at:
http://documents.software.dell.com/netvault-backup/10.0.5/release-notes/
DISCLOSURE TIMELINE
  • 2015-02-05 - Vulnerability reported to vendor
  • 2015-05-26 - Coordinated public release of advisory
CREDIT sztivi
BACK TO ADVISORIES