| 
 | 
FGA-2008-23:EMC NetWorker Denial of Service Vulnerability
2008.October.21 
Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in EMC NetWorker 
Summary:
A resource exhaustion vulnerability exists throughout multiple EMC products through an exploited RPC interface.
Impact:
Denial of service. 
Risk:
Medium
Affected Software:
NetWorker Server, Storage Node and Client 7.4 SP3 
NetWorker Server, Storage Node and Client 7.3 SP4 build 565 
NetWorker Client and Storage Node for Open VMS 7.3.2 ECO7 
NetWorker Module for Microsoft Exchange 5.1 SP1 
NetWorker Module for Microsoft Applications 2.1 
NetWorker Module for Meditech 2.0 SP1 
NetWorker PowerSnap 2.4 SP2 
Additional Information:
The RPC interface used by the affected EMC products does not properly enforce bounds checking on a parameter which is used to allocate memory on the heap. The vulnerable NetWorker products use the process "nsrexecd.exe". A remote attacker can exploit this by repeatedly sending requests to the RPC interface, each time allocating more and more memory. Eventually system resources will be exhausted, and denial of service is achieved. 
Solutions:
Use the solution provided by EMC http://powerlink.emc.com/ 
The FortiGuard Global Security Research Team released a signature "EMC.Products.Malicious.Array.Count.DoS", which covers this specific vulnerability
Fortinet customers who subscribe to Fortinet=92s intrusion prevention (IPS) service should be protected against this