{"api_version":"1","generated_at":"2026-04-23T05:57:09+00:00","cve":"CVE-2011-0647","urls":{"html":"https://cve.report/CVE-2011-0647","api":"https://cve.report/api/cve/CVE-2011-0647.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2011-0647","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2011-0647"},"summary":{"title":"CVE-2011-0647","description":"The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.","state":"PUBLIC","assigner":"security_alert@emc.com","published_at":"2011-02-10 18:00:00","updated_at":"2018-10-09 19:29:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"http://osvdb.org/70853","name":"70853","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65205","name":"replicationmanager-irccd-code-execution(65205)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/516282/100/0/threaded","name":"20110207 ZDI-11-061: EMC Replication Manager Client irccd.exe Remote Code Execution Vulnerability","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.zerodayinitiative.com/advisories/ZDI-11-061/","name":"http://www.zerodayinitiative.com/advisories/ZDI-11-061/","refsource":"MISC","tags":[],"title":"Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/516260","name":"20110208 ESA-2011-004: EMC Replication Manager remote code execution vulnerability","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2011/0304","name":"ADV-2011-0304","refsource":"VUPEN","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/46235","name":"46235","refsource":"BID","tags":[],"title":"EMC Replication Manager Client Control Service Remote Code Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/43164","name":"43164","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"EMC Replication Manager Client irccd.exe Command Execution Vulnerability - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2011-0647","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0647","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"networker_module","cpe6":"2.1","cpe7":"-","cpe8":"microsoft_applications","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"networker_module","cpe6":"2.2","cpe7":"-","cpe8":"microsoft_applications","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"networker_module","cpe6":"2.1","cpe7":"-","cpe8":"microsoft_applications","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"networker_module","cpe6":"2.2","cpe7":"-","cpe8":"microsoft_applications","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"replication_manager","cpe6":"2.0","cpe7":"*","cpe8":"client","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"replication_manager","cpe6":"5.2","cpe7":"*","cpe8":"client","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"replication_manager","cpe6":"5.2.2","cpe7":"*","cpe8":"client","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"replication_manager","cpe6":"2.0","cpe7":"*","cpe8":"client","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"replication_manager","cpe6":"5.2","cpe7":"*","cpe8":"client","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"replication_manager","cpe6":"5.2.2","cpe7":"*","cpe8":"client","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2011","cve_id":"647","vulnerable":"1","versionEndIncluding":"5.2.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"emc","cpe5":"replication_manager","cpe6":"*","cpe7":"*","cpe8":"client","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security_alert@emc.com","ID":"CVE-2011-0647","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20110208 ESA-2011-004: EMC Replication Manager remote code execution vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/516260"},{"name":"43164","refsource":"SECUNIA","url":"http://secunia.com/advisories/43164"},{"name":"46235","refsource":"BID","url":"http://www.securityfocus.com/bid/46235"},{"name":"replicationmanager-irccd-code-execution(65205)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65205"},{"name":"70853","refsource":"OSVDB","url":"http://osvdb.org/70853"},{"name":"ADV-2011-0304","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2011/0304"},{"name":"20110207 ZDI-11-061: EMC Replication Manager Client irccd.exe Remote Code Execution Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/516282/100/0/threaded"},{"name":"http://www.zerodayinitiative.com/advisories/ZDI-11-061/","refsource":"MISC","url":"http://www.zerodayinitiative.com/advisories/ZDI-11-061/"}]}},"nvd":{"publishedDate":"2011-02-10 18:00:00","lastModifiedDate":"2018-10-09 19:29:00","problem_types":["CWE-20"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:replication_manager:5.2.2:*:client:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:replication_manager:5.2:*:client:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:replication_manager:2.0:*:client:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:replication_manager:*:*:client:*:*:*:*:*","versionEndIncluding":"5.2.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:networker_module:2.1:-:microsoft_applications:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:emc:networker_module:2.2:-:microsoft_applications:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2011","CveId":"647","Ordinal":"47706","Title":"CVE-2011-0647","CVE":"CVE-2011-0647","Year":"2011"},"notes":[{"CveYear":"2011","CveId":"647","Ordinal":"1","NoteData":"The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.","Type":"Description","Title":null},{"CveYear":"2011","CveId":"647","Ordinal":"2","NoteData":"2011-02-10","Type":"Other","Title":"Published"},{"CveYear":"2011","CveId":"647","Ordinal":"3","NoteData":"2018-10-09","Type":"Other","Title":"Modified"}]}}}