Lucene search

K
certCERTVU:907729
HistoryJan 14, 2005 - 12:00 a.m.

Veritas Backup Exec registration request buffer overflow

2005-01-1400:00:00
www.kb.cert.org
15

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.95 High

EPSS

Percentile

99.3%

Overview

Certain versions of Veritas Backup Exec 8.x and 9.x can be remotely exploited to allow execution of arbitrary code on affected servers.

Description

A buffer overflow exists in Veritas Backup Exec 8.x (prior to 8.60.3878 Hotfix 68), and 9.x (pritor to 9.1.4691 Hotfix 40). A stack-based buffer can be overwritten when certain registration requests containing overly long hostnames are sent to vulnerable servers.

Exploits for this vulnerability have been made available via public web sites. Active exploitation of this vulnerability has been reported.


Impact

A remote intruder may be able to crash affected systems or execute arbitrary code with the privileges of the running service which may include domain-wide administrative rights.


Solution

Please see the vendor documents with patch information to resolve this issue:

<http://seer.support.veritas.com/docs/273419.htm&gt;
<http://seer.support.veritas.com/docs/273420.htm&gt;
<http://seer.support.veritas.com/docs/273422.htm&gt;
<http://seer.support.veritas.com/docs/273850.htm&gt;


IV. Workarounds

Restrict network access to 6101/tcp on affected servers

Vendor Information

907729

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Hitachi __ Affected

Updated: February 16, 2005

Status

Affected

Vendor Statement

JP1/VERITAS Backup Exec is vulnerable to this issue.

For vendor information please see:
<http://www.hitachi-support.com/security/vuls/HS05-002/index.html&gt; (Japanese)
<http://www.hitachi-support.com/security_e/vuls_e/HS05-002_e/index-e.html&gt; (English)

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see <http://www.hitachi-support.com/security_e/vuls_e/HS05-002_e/index-e.html:&gt;

Update: February 8, 2005

Vulnerability of Buffer Overflow in JP1/VERITAS Backup Exec
β–ͺ Affected product

Corrective action
Product name
Platform
Last update

HS05-002-01
JP1/VERITAS Backup Exec,
VERITAS Backup Exec
Windows
February 8, 2005

β–ͺ Problem description
On December 17, 2004, Veritas released their TechNote titled β€œRemote exploitation of a stack-based buffer overflow vulnerability in Backup Exec 8.6 and 9.x may allow the unauthorized execution of arbitrary code”.
On backup servers of the above products, malicious remote users can exploit the vulnerability of buffer overflow and execute arbitrary code.

Revision history
β€’ February 8, 2005: This page is released.

β€’ Hitachi, Ltd. (hereinafter referred to as β€œHitachi”) tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
β€’ The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
β€’ The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
β€’ The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23907729 Feedback>).

NEC Corporation __ Affected

Updated: February 02, 2005

Status

Affected

Vendor Statement

`* VERITAS Backup Exec 8.x and 9.x

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

A Vendor Statement has also been registered here:

<http://jvn.jp/cert/JVNVU%23907729/index.html&gt;

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23907729 Feedback>).

Veritas SOFTWARE __ Affected

Updated: January 14, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see the Veritas notices posted here:

<http://seer.support.veritas.com/docs/273419.htm&gt;
<http://seer.support.veritas.com/docs/273420.htm&gt;
<http://seer.support.veritas.com/docs/273422.htm&gt;
<http://seer.support.veritas.com/docs/273850.htm&gt;

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23907729 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

iDefense has credited an anonymous contributor and Patrik Karlsson for discovering this vulnerability.

This document was written by Jeffrey S. Havrilla.

Other Information

CVE IDs: CVE-2004-1172
Severity Metric: 17.82 Date Public:

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.95 High

EPSS

Percentile

99.3%