<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2012-4607 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2012-4607/m-p/3752#M2758</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No hits when I searched for that CVE in threat vault &lt;A class="active_link" href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However searching for networker gave me this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31529" title="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31529"&gt;https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31529&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="ListTable"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31529" target="_blank"&gt;&lt;IMG alt="Detail" class="jiveImage" src="https://ip1.i.lithium.com/5bc835567ce40c0c6f9341d198663932e6a30806/68747470733a2f2f7468726561747661756c742e70616c6f616c746f6e6574776f726b732e636f6d2f436f6e74656e742f496d616765732f44657461696c49636f6e2e676966" title="Detail" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;31529&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt; EMC Legato NetWorker Remote Exec Service Buffer Overflow &lt;/TD&gt;&lt;TD&gt; high &lt;/TD&gt;&lt;TD&gt; CVE-2007-3618 &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;H1&gt;EMC Legato NetWorker Remote Exec Service Buffer Overflow&lt;/H1&gt;&lt;H2&gt;Overview&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Attack Name &lt;/TD&gt;&lt;TD class="detail-field"&gt; EMC Legato NetWorker Remote Exec Service Buffer Overflow &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; Description &lt;/TD&gt;&lt;TD&gt; There exists a buffer overflow vulnerability in EMC legato NetWorker product. The flaw is due to improper boundary protection when processing RPC requests. A remote unauthenticated attacker can leverage this vulnerability by sending crafted RPC message to the target host, potentially inject and execute arbitrary code with System level privileges. &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Threat ID &lt;/TD&gt;&lt;TD&gt; 31529 &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; References &lt;/TD&gt;&lt;TD&gt; &lt;A href="http://secunia.com/advisories/26517" target="_blank"&gt;http://secunia.com/advisories/26517&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.zerodayinitiative.com/advisories/ZDI-07-049.html" target="_blank"&gt;http://www.zerodayinitiative.com/advisories/ZDI-07-049.html&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Severity &lt;/TD&gt;&lt;TD&gt; high &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; Category &lt;/TD&gt;&lt;TD&gt; overflow &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 Jan 2013 09:50:47 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2013-01-24T09:50:47Z</dc:date>
    <item>
      <title>CVE-2012-4607</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2012-4607/m-p/3751#M2757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the Palo firewall (version 4.1.10) with threat update version 351 block vulnerability CVE-2012-4607&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000154; font-family: Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; background-color: #f6f0d0;"&gt;"Buffer overflow in nsrindexd in EMC NetWorker 7.5.x and 7.6.x before 7.6.5, and 8.x before 8.0.0.6, allows remote attackers to execute arbitrary code via crafted SunRPC data.&lt;/SPAN&gt;"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 09:04:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2012-4607/m-p/3751#M2757</guid>
      <dc:creator>ERIKS</dc:creator>
      <dc:date>2013-01-24T09:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2012-4607</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2012-4607/m-p/3752#M2758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No hits when I searched for that CVE in threat vault &lt;A class="active_link" href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However searching for networker gave me this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31529" title="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31529"&gt;https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31529&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="ListTable"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31529" target="_blank"&gt;&lt;IMG alt="Detail" class="jiveImage" src="https://ip1.i.lithium.com/5bc835567ce40c0c6f9341d198663932e6a30806/68747470733a2f2f7468726561747661756c742e70616c6f616c746f6e6574776f726b732e636f6d2f436f6e74656e742f496d616765732f44657461696c49636f6e2e676966" title="Detail" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;31529&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt; EMC Legato NetWorker Remote Exec Service Buffer Overflow &lt;/TD&gt;&lt;TD&gt; high &lt;/TD&gt;&lt;TD&gt; CVE-2007-3618 &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;H1&gt;EMC Legato NetWorker Remote Exec Service Buffer Overflow&lt;/H1&gt;&lt;H2&gt;Overview&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Attack Name &lt;/TD&gt;&lt;TD class="detail-field"&gt; EMC Legato NetWorker Remote Exec Service Buffer Overflow &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; Description &lt;/TD&gt;&lt;TD&gt; There exists a buffer overflow vulnerability in EMC legato NetWorker product. The flaw is due to improper boundary protection when processing RPC requests. A remote unauthenticated attacker can leverage this vulnerability by sending crafted RPC message to the target host, potentially inject and execute arbitrary code with System level privileges. &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Threat ID &lt;/TD&gt;&lt;TD&gt; 31529 &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; References &lt;/TD&gt;&lt;TD&gt; &lt;A href="http://secunia.com/advisories/26517" target="_blank"&gt;http://secunia.com/advisories/26517&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.zerodayinitiative.com/advisories/ZDI-07-049.html" target="_blank"&gt;http://www.zerodayinitiative.com/advisories/ZDI-07-049.html&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Severity &lt;/TD&gt;&lt;TD&gt; high &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; Category &lt;/TD&gt;&lt;TD&gt; overflow &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 09:50:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2012-4607/m-p/3752#M2758</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-24T09:50:47Z</dc:date>
    </item>
  </channel>
</rss>

