CVE-2008-6219
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
20/02/2009
Last modified:
09/04/2025
Description
nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier, Module for Microsoft Exchange 5.1 and earlier, Module for Microsoft Applications 2.0 and earlier, Module for Meditech 2.0 and earlier, and PowerSnap 2.4 SP1 and earlier does not properly control the allocation of memory, which allows remote attackers to cause a denial of service (memory exhaustion) via multiple crafted RPC requests.
Impact
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:emc:networker_client:*:sp3:*:*:*:*:*:* | 7.3 (including) | |
| cpe:2.3:a:emc:networker_client:*:eco6:open_vms:*:*:*:*:* | 7.3.2 (including) | |
| cpe:2.3:a:emc:networker_client:7.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:emc:networker_client:7.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:emc:networker_client:7.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:emc:networker_module:*:-:meditech:*:*:*:*:* | 2.0 (including) | |
| cpe:2.3:a:emc:networker_module:*:-:microsoft_applications:*:*:*:*:* | 2.0 (including) | |
| cpe:2.3:a:emc:networker_module:*:-:microsoft_exchange:*:*:*:*:* | 5.1 (including) | |
| cpe:2.3:a:emc:networker_powersnap:*:sp1:*:*:*:*:*:* | 2.4 (including) | |
| cpe:2.3:a:emc:networker_server:*:sp3:*:*:*:*:*:* | 7.3 (including) | |
| cpe:2.3:a:emc:networker_server:7.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:emc:networker_server:7.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:emc:networker_server:7.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:emc:networker_storage_node:*:sp3:*:*:*:*:*:* | 7.3 (including) | |
| cpe:2.3:a:emc:networker_storage_node:*:eco6:open_vms:*:*:*:*:* | 7.3.2 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/32383
- http://www.fortiguardcenter.com/advisory/FGA-2008-23.html
- http://www.securityfocus.com/archive/1/497645/100/0/threaded
- http://www.securityfocus.com/archive/1/497666/100/0/threaded
- http://www.securityfocus.com/bid/31866
- http://www.securitytracker.com/id?1021095=
- http://www.vupen.com/english/advisories/2008/2894
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46035
- http://secunia.com/advisories/32383
- http://www.fortiguardcenter.com/advisory/FGA-2008-23.html
- http://www.securityfocus.com/archive/1/497645/100/0/threaded
- http://www.securityfocus.com/archive/1/497666/100/0/threaded
- http://www.securityfocus.com/bid/31866
- http://www.securitytracker.com/id?1021095=
- http://www.vupen.com/english/advisories/2008/2894
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46035



