search menu icon-carat-right cmu-wordmark

CERT Coordination Center


EMC Legato NetWorker portmapper allows remote calls to "pmap_set" and "pmap_unset"

Vulnerability Note VU#801089

Original Release Date: 2005-08-16 | Last Revised: 2005-09-19

Overview

The EMC Legato NetWorker PortMapper allows remote access to pmap_set and pmap_unset. This could allow a remote attacker to cause a denial of service or potentially to eavesdrop on communications between NetWorker programs.

Description

EMC Legato NetWorker is a cross-platform backup and recovery application. It is also repackaged by Sun Microsystems as Solstice Backup and StorEdge Enterprise Backup, by FSC as Fujitsu Siemens Computers' NetWorker, by NEC as WebSAM NetWorker Powered by Legato, and by Fujitsu as NetWorker.

Legato PortMapper

The Legato PortMapper, also known as lgtomapper, is a service that listens on port 7938 and converts RPC program numbers into TCP or UDP protocol port numbers. The RPC pmap_set command can be used to map a remote procedure call to a port. pmap_unset destroys the mappings between a remote procedure call and a port.

The problem

With most portmapper implementations, the pmap_set and pmap_unset calls are restricted in ways such as only allowing connections from localhost. The Legato PortMapper allows any host to call pmap_set and pmap_unset. This may allow a remote, unauthenticated attacker to unregister existing NetWorker RPC services or register new RPC services.

Impact

A remote unauthenticated attacker may be able to create a denial-of-service condition by unregistering NetWorker services. An attacker may be able to eavesdrop on NetWorker process communications by registering a new RPC service.

Solution

Apply a patch or upgrade
Apply a patch or upgrade, as specified in the EMC Legato Technical Product Alert.

Sun Solstice Backup and StorEdge Enterprise Backup customers should see Sun Alert 101866 for patch availability.


Restrict Access

You may wish to block access to the vulnerable software from outside your network perimeter, specifically by blocking access to the ports used by NetWorker (typically TCP and UDP ports 7937-9936). This will limit your exposure to attacks. However, blocking at the network perimeter would still allow attackers within the perimeter of your network to exploit the vulnerability. The use of host-based firewalls in addition to network-based firewalls can help restrict access to specific hosts within the network. It is important to understand your network's configuration and service requirements before deciding what changes are appropriate.

Vendor Information

801089
Expand all

EMC Software

Notified:  June 03, 2005 Updated:  August 16, 2005

Status

  Vulnerable

Vendor Statement

EMC has created - and made available to customers - a software patch
to fix the vulnerability identified in this advisory. The patch is
available for download at
http://www.legato.com/support/websupport/product_alerts/081605_NW_port_mapper.htm
An integrated resolution to this vulnerability will be
available in the next release of EMC Legato NetWorker, which is
planned to be generally available in Q4 of 2005.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Fujitsu Limited

Notified:  August 15, 2005 Updated:  August 24, 2005

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

NEC

Notified:  August 15, 2005 Updated:  August 24, 2005

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Sun Microsystems, Inc.

Notified:  July 12, 2005 Updated:  September 19, 2005

Status

  Vulnerable

Vendor Statement

Sun repackages the Legato Networker product as Sun StorEdge Enterprise Backup, and is affected by the vulnerability described in CERT VU#801089. Sun has published Sun Alert 101866 which is available here:

http://sunsolve.sun.com/search/document.do?assetkey=1-26-101886-1

for this issue.

The Sun Alert contains details of patches which have been released for StorEdge Enterprise Backup version 7.1 and StorEdge Enterprise Backup version 7.2, which address this issue.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

Thanks to the NOAA NCIRT Lab for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2005-0359
Severity Metric: 3.66
Date Public: 2005-08-16
Date First Published: 2005-08-16
Date Last Updated: 2005-09-19 15:11 UTC
Document Revision: 29

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.