First published: Fri Apr 20 2012(Updated: )
The DPA_Utilities.cProcessAuthenticationData function in EMC Data Protection Advisor (DPA) 5.5 through 5.8 SP1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an AUTHENTICATECONNECTION command that (1) lacks a password field or (2) has an empty password.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Data Protection Advisor | =5.5 | |
Dell EMC Data Protection Advisor | =5.5-sp1 | |
Dell EMC Data Protection Advisor | =5.6 | |
Dell EMC Data Protection Advisor | =5.6-sp1 | |
Dell EMC Data Protection Advisor | =5.7 | |
Dell EMC Data Protection Advisor | =5.7-sp1 | |
Dell EMC Data Protection Advisor | =5.8 | |
Dell EMC Data Protection Advisor | =5.8-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0406 is classified as a medium severity vulnerability due to its potential for denial of service.
To mitigate CVE-2012-0406, upgrade to a version of EMC Data Protection Advisor that is beyond 5.8 SP1.
CVE-2012-0406 affects EMC Data Protection Advisor versions 5.5 through 5.8 SP1.
CVE-2012-0406 allows remote attackers to crash the daemon through a NULL pointer dereference.
The vulnerability can be exploited via an AUTHENTICATECONNECTION command that lacks a password or is empty.