---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Acronis True Image Echo Group Server and Windows Agent Denial of Service SECUNIA ADVISORY ID: SA29306 VERIFY ADVISORY: http://secunia.com/advisories/29306/ CRITICAL: Less critical IMPACT: DoS WHERE: >From local network SOFTWARE: Acronis True Image Echo Enterprise Server 9.x http://secunia.com/product/17912/ DESCRIPTION: Luigi Auriemma has reported some vulnerabilities in Acronis True Image Echo, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An input validation error within the Acronis Group Server component can be exploited to cause the service to crash via a specially crafted packet. 2) A NULL-pointer dereference error within the Acronis True Image Windows Agent component can be exploited to cause the service to crash via a specially crafted packet. The vulnerabilities are reported in Acronis Group Server version 1.5.19.191 and Acronis True Image Windows Agent version 1.0.0.54 included in Acronis True Image Echo Enterprise Server version 9.5.0.8072. Other versions may also be affected. SOLUTION: Restrict network access to the services. PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/acrogroup-adv.txt http://aluigi.altervista.org/adv/acroagent-adv.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------