Zero Day Initiative Advisory 08-075...

- AV AC AU C I A
发布: 2008-11-20
修订: 2025-04-13

A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of EMC Control Center SAN Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists in the SAN Manager Master Agent service (msragent.exe) which listens by default on TCP port 10444. While processing SST_CTGTRANS requests the process copies packet data into a fixed length stack buffer. Exploitation allows for arbitrary code execution under the context of the SYSTEM user.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息