Is the DoubleTake.exe process a virus, spyware or malware?

Process description:


Author: Double-Take Software, Inc.
Part of: DoubleTake
The main process used by DoubleTake, a computer server replication application.

DoubleTake.exe is responsible for monitoring changes on a host server and immediately replicating the change on the target server.

DoubleTake ensures high availability and disaster recovery as if errors should occur on the host server, the 'backup' machine is up-to-date.
1 visitor has rated the threat level of this process as:


Agree/disagree? Rate now
Common location(s):
Visitor comments
... rated this process as unknown
The information below was taken from Juniper Networks, J-Security Center.

The URL to the full article is:

Title: HP StorageWorks Storage Mirroring Software 'DoubleTake.exe' Remote Code Execution Vulnerability
Severity: HIGH

HP StorageWorks Storage Mirroring Software (SWSM) is a host-based replication and failover solution for enterprises.

SWSM is prone to a remote code-execution vulnerability that allows remote attackers to execute arbitrary machine code in the context of the affected application.

The problem occurs in the 'DoubleTake.exe' process when handling an encoded authentication request. Specifically, a buffer overflow occurs when the process copies user-supplied login information (at least 256 bytes) into a fixed-length stack buffer.

The issue affects SWSM 4.5 SP1.
Affected Products:

* Double-Take Software Double-Take
* HP HP StorageWorks Storage Mirroring Software 4.5 SP1


* HP: HP StorageWorks Storage Mirroring Software Homepage
* HP: HPSBST02312 SSRT071428 rev.1 - HP StorageWorks Storage Mirroring Software, Remot
* Zero Day Initiative: HP StorageWorks Storage Mirroring Authentication Processing Stack Overflow Vulne
Add comment
Your details
Receive notification emails when new replies are received on this page?
Vote: Unknown
Message: (Messages are NOT required to vote)

To help us fight spam, please answer the following question:
What is four + 4?
previous process
next process
Privacy | Terms & Conditions | Resources | Contact Us
All images and content copyright © 2008-2019 All Rights Reserved.