Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2005-0359

Summary
Assigner-certcc
Assigner Org ID-37e5125f-f79b-445b-8fad-9564f167944b
Published At-20 Aug, 2005 | 04:00
Updated At-07 Aug, 2024 | 21:13
Rejected At-
Credits

The Legato PortMapper in EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 through 7.2 does not restrict access to the pmap_set and pmap_unset commands, which allows remote attackers to (1) cause a denial of service by using pmap_unset to un-register a NetWorker service, or (2) obtain sensitive information from NetWorker services by using pmap_set to register a new service.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:certcc
Assigner Org ID:37e5125f-f79b-445b-8fad-9564f167944b
Published At:20 Aug, 2005 | 04:00
Updated At:07 Aug, 2024 | 21:13
Rejected At:
▼CVE Numbering Authority (CNA)

The Legato PortMapper in EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 through 7.2 does not restrict access to the pmap_set and pmap_unset commands, which allows remote attackers to (1) cause a denial of service by using pmap_unset to un-register a NetWorker service, or (2) obtain sensitive information from NetWorker services by using pmap_set to register a new service.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.kb.cert.org/vuls/id/801089
third-party-advisory
x_refsource_CERT-VN
https://exchange.xforce.ibmcloud.com/vulnerabilities/21893
vdb-entry
x_refsource_XF
http://secunia.com/advisories/16470
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/16464
third-party-advisory
x_refsource_SECUNIA
http://securitytracker.com/id?1014713
vdb-entry
x_refsource_SECTRACK
http://www.securityfocus.com/bid/14582
vdb-entry
x_refsource_BID
http://www.legato.com/support/websupport/product_alerts/081605_NW_port_mapper.htm
x_refsource_CONFIRM
http://www.osvdb.org/18802
vdb-entry
x_refsource_OSVDB
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.kb.cert.org/vuls/id/801089
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/21893
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/16470
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/16464
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securitytracker.com/id?1014713
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securityfocus.com/bid/14582
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.legato.com/support/websupport/product_alerts/081605_NW_port_mapper.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.osvdb.org/18802
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1
Resource:
vendor-advisory
x_refsource_SUNALERT
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.kb.cert.org/vuls/id/801089
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/21893
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/16470
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/16464
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securitytracker.com/id?1014713
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securityfocus.com/bid/14582
vdb-entry
x_refsource_BID
x_transferred
http://www.legato.com/support/websupport/product_alerts/081605_NW_port_mapper.htm
x_refsource_CONFIRM
x_transferred
http://www.osvdb.org/18802
vdb-entry
x_refsource_OSVDB
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/801089
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/21893
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/16470
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/16464
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securitytracker.com/id?1014713
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securityfocus.com/bid/14582
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.legato.com/support/websupport/product_alerts/081605_NW_port_mapper.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.osvdb.org/18802
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cret@cert.org
Published At:23 Aug, 2005 | 04:00
Updated At:03 Apr, 2025 | 01:03

The Legato PortMapper in EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 through 7.2 does not restrict access to the pmap_set and pmap_unset commands, which allows remote attackers to (1) cause a denial of service by using pmap_unset to un-register a NetWorker service, or (2) obtain sensitive information from NetWorker services by using pmap_set to register a new service.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.4MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:P
Type: Primary
Version: 2.0
Base score: 6.4
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:P
CPE Matches

ELAN Microelectronics Corporation
emc
>>legato_networker>>4.2.2
cpe:2.3:a:emc:legato_networker:4.2.2:*:*:*:*:*:*:*
ELAN Microelectronics Corporation
emc
>>legato_networker>>6.0
cpe:2.3:a:emc:legato_networker:6.0:*:*:*:*:*:*:*
ELAN Microelectronics Corporation
emc
>>legato_networker>>6.1
cpe:2.3:a:emc:legato_networker:6.1:*:*:*:*:*:*:*
ELAN Microelectronics Corporation
emc
>>legato_networker>>7.2
cpe:2.3:a:emc:legato_networker:7.2:*:*:*:*:*:*:*
ELAN Microelectronics Corporation
emc
>>legato_networker>>7.13
cpe:2.3:a:emc:legato_networker:7.13:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>solstice_backup>>6.0
cpe:2.3:a:sun:solstice_backup:6.0:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>solstice_backup>>6.1
cpe:2.3:a:sun:solstice_backup:6.1:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>storedge_enterprise_backup_software>>7.0
cpe:2.3:a:sun:storedge_enterprise_backup_software:7.0:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>storedge_enterprise_backup_software>>7.1
cpe:2.3:a:sun:storedge_enterprise_backup_software:7.1:*:*:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>storedge_enterprise_backup_software>>7.2
cpe:2.3:a:sun:storedge_enterprise_backup_software:7.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/16464cret@cert.org
Patch
Vendor Advisory
http://secunia.com/advisories/16470cret@cert.org
Vendor Advisory
http://securitytracker.com/id?1014713cret@cert.org
Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1cret@cert.org
Patch
Vendor Advisory
http://www.kb.cert.org/vuls/id/801089cret@cert.org
Patch
Third Party Advisory
US Government Resource
http://www.legato.com/support/websupport/product_alerts/081605_NW_port_mapper.htmcret@cert.org
Patch
http://www.osvdb.org/18802cret@cert.org
N/A
http://www.securityfocus.com/bid/14582cret@cert.org
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/21893cret@cert.org
N/A
http://secunia.com/advisories/16464af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://secunia.com/advisories/16470af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1014713af854a3a-2127-422b-91ae-364da2661108
Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.kb.cert.org/vuls/id/801089af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
US Government Resource
http://www.legato.com/support/websupport/product_alerts/081605_NW_port_mapper.htmaf854a3a-2127-422b-91ae-364da2661108
Patch
http://www.osvdb.org/18802af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/14582af854a3a-2127-422b-91ae-364da2661108
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/21893af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://secunia.com/advisories/16464
Source: cret@cert.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/16470
Source: cret@cert.org
Resource:
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1014713
Source: cret@cert.org
Resource:
Patch
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1
Source: cret@cert.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/801089
Source: cret@cert.org
Resource:
Patch
Third Party Advisory
US Government Resource
Hyperlink: http://www.legato.com/support/websupport/product_alerts/081605_NW_port_mapper.htm
Source: cret@cert.org
Resource:
Patch
Hyperlink: http://www.osvdb.org/18802
Source: cret@cert.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/14582
Source: cret@cert.org
Resource:
Patch
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/21893
Source: cret@cert.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/16464
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/16470
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1014713
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/801089
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
US Government Resource
Hyperlink: http://www.legato.com/support/websupport/product_alerts/081605_NW_port_mapper.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.osvdb.org/18802
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/14582
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/21893
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2013-5812
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.4||MEDIUM
EPSS-4.20% / 88.27%
||
7 Day CHG~0.00%
Published-16 Oct, 2013 | 17:31
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Deployment.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)Oracle Corporation
Product-jrejdkn/a
CVE-2013-2407
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.4||MEDIUM
EPSS-5.35% / 89.69%
||
7 Day CHG~0.00%
Published-18 Jun, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "XML security and the class loader."

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)Oracle Corporation
Product-jrejdkn/a
CVE-2012-0502
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.4||MEDIUM
EPSS-2.67% / 85.22%
||
7 Day CHG~0.00%
Published-15 Feb, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.

Action-Not Available
Vendor-n/aOracle CorporationSun Microsystems (Oracle Corporation)
Product-jren/a
CVE-2011-0321
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.4||MEDIUM
EPSS-1.35% / 79.29%
||
7 Day CHG~0.00%
Published-01 Feb, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

librpc.dll in nsrexecd in EMC NetWorker before 7.5 SP4, 7.5.3.x before 7.5.3.5, and 7.6.x before 7.6.1.2 does not properly mitigate the possibility of a spoofed localhost source IP address, which allows remote attackers to (1) register or (2) unregister RPC services, and consequently cause a denial of service or obtain sensitive information from interprocess communication, via crafted UDP packets containing service commands.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-networkern/a
CVE-2001-0421
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-2.44% / 84.57%
||
7 Day CHG~0.00%
Published-24 May, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-solarissunosn/a
CVE-2007-5482
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-1.26% / 78.57%
||
7 Day CHG~0.00%
Published-16 Oct, 2007 | 23:00
Updated-07 Aug, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the FTP service in Sun StorEdge/StorageTek 3510 FC Array with firmware before 4.21 allows remote attackers, with access to the Ethernet management interface, to cause a denial of service (I/O request timeout and device hang) via unspecified vectors.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-storagetek_3510storedgen/a
CVE-2011-3563
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.4||MEDIUM
EPSS-5.98% / 90.32%
||
7 Day CHG~0.00%
Published-15 Feb, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.

Action-Not Available
Vendor-n/aOracle CorporationSun Microsystems (Oracle Corporation)
Product-jren/a
Details not found