Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:26753
HistoryAug 01, 2011 - 12:00 a.m.

ESA-2011-021: EMC Data Protection Advisor sensitive information disclosure vulnerability

2011-08-0100:00:00
vulners.com
9

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2011-021: EMC Data Protection Advisor sensitive information
disclosure vulnerability.

EMC Identifier: ESA-2011-021

CVE Identifier: CVE-2011-1742

Severity Rating: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Affected products:

EMC SW: EMC Data Protection Advisor earlier than 5.8.1

Vulnerability Summary:

A vulnerability exists in EMC Data Protection Advisor in which
sensitive information may be exposed in clear text in the
configuration file.

Vulnerability Details:

In certain situations, sensitive account credentials may potentially
be displayed in clear text in the DPA configuration file. The
credentials are not stored in clear text by default or during normal
operation of the product. Review EMC Knowledgebase solution <A
href="http://solutions.emc.com/emcsolutionview.asp?id=esg122538&quot;&gt;esg122538&lt;/A&gt;
to determine if your existing installation has already been exposed
to this issue.

Problem Resolution:

The following EMC Data Protection Advisor products contain
resolution to this issue:

EMC Data Protection Advisor 5.7.1 (Hot Fix DPA-9792)
EMC Data Protection Advisor 5.8 (Hot Fix DPA-9792)
EMC Data Protection Advisor 5.8.1

EMC strongly recommends all customers upgrade and/or apply
identified security hot fixes at the earliest opportunity. Customers
may also follow instructions provided in EMC Knowledgebase solution
esg122538 to mitigate existing instances of the issue. Security hot
fixes must be applied to prevent any future instances of the issue.

Link to remedies:
Registered EMC Powerlink customers can download software from
Powerlink.
For Data Protection Advisor Software, navigate in Powerlink to Home
> Support > Software Downloads and Licensing > Downloads D > Data
Protection Advisor.

Please contact EMC Technical Support at 1-800-782-4362 for
obtaining the Hot Fixes.

Because the view is restricted based on customer agreements, you may
not have permission to view certain downloads. Should you not see a
software download you believe you should have access to, follow the
instructions in EMC Knowledgebase solution emc116045.

For explanation of Severity Ratings, refer to EMC Knowledgebase
solution emc218831. EMC recommends that all customers take into
account both the base score and any relevant temporal and
environmental scores, which may impact the potential severity
associated with particular security vulnerability.

EMC Corporation distributes EMC Security Advisories in order to
bring to the attention of users of the affected EMC products
important security information. EMC recommends all users determine
the applicability of this information to their individual situations
and take appropriate action. The information set forth herein is
provided "as is" without warranty of any kind. EMC disclaims all
warranties, either express or implied, including the warranties of
merchantability, fitness for a particular purpose, title and
non-infringement. In no event shall EMC or its suppliers be liable
for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if
EMC or its suppliers have been advised of the possibility of such
damages. Some states do not allow the exclusion or limitation of
liability for consequential or incidental damages so the foregoing
limitation may not apply.

EMC Product Security Response Center
[email protected]
http://www.emc.com/contact-us/contact/product-security-response-center.htm

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Cygwin)

iEYEARECAAYFAk4vNhgACgkQtjd2rKp+ALyDVQCeMeg2j3MM3FuK0A9Xy21qIwP4
afkAnj02pCnMHFeZZ/VahJJAVkjy4k3G
=kat6
-----END PGP SIGNATURE-----

Related for SECURITYVULNS:DOC:26753