CVE-2008-6219
Published Feb 20, 2009
Last updated 6 years ago
Overview
- Description
- nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier, Module for Microsoft Exchange 5.1 and earlier, Module for Microsoft Applications 2.0 and earlier, Module for Meditech 2.0 and earlier, and PowerSnap 2.4 SP1 and earlier does not properly control the allocation of memory, which allows remote attackers to cause a denial of service (memory exhaustion) via multiple crafted RPC requests.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:networker_client:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "518449F8-CA1E-415D-8552-293D624D033F", "versionEndIncluding": "7.3" }, { "criteria": "cpe:2.3:a:emc:networker_client:*:eco6:open_vms:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0930C345-86C8-4665-B2A2-2F9E0595C43C", "versionEndIncluding": "7.3.2" }, { "criteria": "cpe:2.3:a:emc:networker_client:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A4BC0C3-5AA5-4D23-A628-EFE4BC2ADA40" }, { "criteria": "cpe:2.3:a:emc:networker_client:7.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "116DD16E-0691-4D26-967C-CDF193BEE875" }, { "criteria": "cpe:2.3:a:emc:networker_client:7.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D775A35D-CA14-4961-81B0-864CE6016CE6" }, { "criteria": "cpe:2.3:a:emc:networker_module:*:-:meditech:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "524F2801-C162-44F6-9D00-E3771636C631", "versionEndIncluding": "2.0" }, { "criteria": "cpe:2.3:a:emc:networker_module:*:-:microsoft_applications:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C64C53C8-A5A0-477B-BBAB-39F220A17A34", "versionEndIncluding": "2.0" }, { "criteria": "cpe:2.3:a:emc:networker_module:*:-:microsoft_exchange:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8F5C21D-CF34-4C27-95A5-61C6C9608879", "versionEndIncluding": "5.1" }, { "criteria": "cpe:2.3:a:emc:networker_powersnap:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28FC12F2-B22E-4A14-B85C-EB7C85234424", "versionEndIncluding": "2.4" }, { "criteria": "cpe:2.3:a:emc:networker_server:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7542466A-A255-41D4-BC60-15FAF2C850F2", "versionEndIncluding": "7.3" }, { "criteria": "cpe:2.3:a:emc:networker_server:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D79E4890-47C3-475F-8008-8C78871EF306" }, { "criteria": "cpe:2.3:a:emc:networker_server:7.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D842DAB-610B-4AED-9605-2E1456BE5EB5" }, { "criteria": "cpe:2.3:a:emc:networker_server:7.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83AE5E4B-E8E0-4F55-8924-21F529EC2057" }, { "criteria": "cpe:2.3:a:emc:networker_storage_node:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B5399B8-CD20-421D-B49E-BF3EAC5A5914", "versionEndIncluding": "7.3" }, { "criteria": "cpe:2.3:a:emc:networker_storage_node:*:eco6:open_vms:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40421894-395E-43C6-BEA2-51A25666470A", "versionEndIncluding": "7.3.2" }, { "criteria": "cpe:2.3:a:emc:networker_storage_node:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D11F7AC-E6F8-42F5-933E-1DCDA1CE5CED" }, { "criteria": "cpe:2.3:a:emc:networker_storage_node:7.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "657928E4-E6A0-4127-96FA-FC9116AF3FA8" }, { "criteria": "cpe:2.3:a:emc:networker_storage_node:7.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0BA0545-C69B-40A4-9FD7-51705EBC9C0B" } ], "operator": "OR" } ] } ]