Zero Day Initiative Advisory 08-076...

- AV AC AU C I A
发布: 2008-11-20
修订: 2025-04-13

A vulnerability allows remote attackers to retrieve arbitrary files on systems with vulnerable installations of EMC Control Center SAN Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists in the SAN Manager Master Agent service (msragent.exe) which listens by default on TCP port 10444. While processing SST_SENDFILE requests the service does not validate the requestor allowing any remote attacker to download arbitrary files.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息