10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.95 High
EPSS
Percentile
99.3%
Certain versions of Veritas Backup Exec 8.x and 9.x can be remotely exploited to allow execution of arbitrary code on affected servers.
A buffer overflow exists in Veritas Backup Exec 8.x (prior to 8.60.3878 Hotfix 68), and 9.x (pritor to 9.1.4691 Hotfix 40). A stack-based buffer can be overwritten when certain registration requests containing overly long hostnames are sent to vulnerable servers.
Exploits for this vulnerability have been made available via public web sites. Active exploitation of this vulnerability has been reported.
A remote intruder may be able to crash affected systems or execute arbitrary code with the privileges of the running service which may include domain-wide administrative rights.
Please see the vendor documents with patch information to resolve this issue:
<http://seer.support.veritas.com/docs/273419.htm>
<http://seer.support.veritas.com/docs/273420.htm>
<http://seer.support.veritas.com/docs/273422.htm>
<http://seer.support.veritas.com/docs/273850.htm>
907729
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: February 16, 2005
Affected
JP1/VERITAS Backup Exec is vulnerable to this issue.
For vendor information please see:
<http://www.hitachi-support.com/security/vuls/HS05-002/index.html> (Japanese)
<http://www.hitachi-support.com/security_e/vuls_e/HS05-002_e/index-e.html> (English)
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://www.hitachi-support.com/security_e/vuls_e/HS05-002_e/index-e.html:>
Update: February 8, 2005
Vulnerability of Buffer Overflow in JP1/VERITAS Backup Exec
βͺ Affected product
Corrective action
Product name
Platform
Last update
HS05-002-01
JP1/VERITAS Backup Exec,
VERITAS Backup Exec
Windows
February 8, 2005
βͺ Problem description
On December 17, 2004, Veritas released their TechNote titled βRemote exploitation of a stack-based buffer overflow vulnerability in Backup Exec 8.6 and 9.x may allow the unauthorized execution of arbitrary codeβ.
On backup servers of the above products, malicious remote users can exploit the vulnerability of buffer overflow and execute arbitrary code.
Revision history
β’ February 8, 2005: This page is released.
β’ Hitachi, Ltd. (hereinafter referred to as βHitachiβ) tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
β’ The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
β’ The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
β’ The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23907729 Feedback>).
Updated: February 02, 2005
Affected
`* VERITAS Backup Exec 8.x and 9.x
<http://www.ace.comp.nec.co.jp/BackupExec/>
οΌonly in Japanese)The vendor has not provided us with any further information regarding this vulnerability.
A Vendor Statement has also been registered here:
<http://jvn.jp/cert/JVNVU%23907729/index.html>
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23907729 Feedback>).
Updated: January 14, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see the Veritas notices posted here:
<http://seer.support.veritas.com/docs/273419.htm>
<http://seer.support.veritas.com/docs/273420.htm>
<http://seer.support.veritas.com/docs/273422.htm>
<http://seer.support.veritas.com/docs/273850.htm>
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23907729 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
iDefense has credited an anonymous contributor and Patrik Karlsson for discovering this vulnerability.
This document was written by Jeffrey S. Havrilla.
CVE IDs: | CVE-2004-1172 |
---|---|
Severity Metric: | 17.82 Date Public: |
jvn.jp/cert/JVNVU%23907729/index.html
secunia.com/advisories/13495/
securitytracker.com/alerts/2004/Dec/1012597.html
seer.support.veritas.com/docs/240870.htm
seer.support.veritas.com/docs/273419.htm
seer.support.veritas.com/docs/273420.htm
seer.support.veritas.com/docs/273422.htm
seer.support.veritas.com/docs/273850.htm
veritas.com/Products/www?c=product&refId=57
www.idefense.com/application/poi/display?id=169&type=vulnerabilities&flashstatus=false
www.securityfocus.com/bid/11974
xforce.iss.net/xforce/xfdb/18506