Two vulnerabilities have been reported in BakBone NetVault Report Manager, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerabilities are caused due to boundary errors within the scheduler client (clsscheduler.exe) and the scheduler server (srvscheduler.exe). These can be exploited to cause heap-based buffer overflows, by sending specially crafted GET or POST requests containing overly long filename arguments to port 7977/TCP or 7978/TCP.
Successful exploitation may allow execution of arbitrary code.
The vulnerabilities are reported in BakBone NetVault Report Manager prior to version 3.5 Update 4.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org