Lucene search

K
nessusThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.VERITAS_NETBACKUP_VTS16-001.NASL
HistoryMay 13, 2016 - 12:00 a.m.

Veritas NetBackup 7.x < 7.7.2 Multiple Vulnerabilities (VTS16-001)

2016-05-1300:00:00
This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
369

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

76.7%

The Veritas NetBackup installation on the remote Windows host is 7.x prior to version 7.7.2 or is missing a vendor supplied hotfix. It is, therefore, affected by multiple vulnerabilities :

  • A remote command execution vulnerability exists in the bpcd service due to a failure to properly sanitize user-supplied input. An unauthenticated, remote attacker can exploit this to execute arbitrary commands.
    (CVE-2015-6550)

  • An information disclosure vulnerability exists due to insufficient protection of communication between the NBU server and the administration console. A man-in-the-middle attacker can exploit this to disclose sensitive information including login credentials.
    (CVE-2015-6551)

  • An unspecified flaw exists that allows a remote attacker to execute arbitrary RPC calls. (CVE-2015-6552)

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(91126);
  script_version("1.10");
  script_cvs_date("Date: 2019/11/19");

  script_cve_id("CVE-2015-6550", "CVE-2015-6551", "CVE-2015-6552");

  script_name(english:"Veritas NetBackup 7.x < 7.7.2 Multiple Vulnerabilities (VTS16-001)");
  script_summary(english:"Checks the version and hotfixes of NetBackup.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has a back-up management application installed that is
affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The Veritas NetBackup installation on the remote Windows host is 7.x
prior to version 7.7.2 or is missing a vendor supplied hotfix. It is,
therefore, affected by multiple vulnerabilities :

  - A remote command execution vulnerability exists in the
    bpcd service due to a failure to properly sanitize
    user-supplied input. An unauthenticated, remote attacker
    can exploit this to execute arbitrary commands.
    (CVE-2015-6550)

  - An information disclosure vulnerability exists due to
    insufficient protection of communication between the NBU
    server and the administration console. A
    man-in-the-middle attacker can exploit this to disclose
    sensitive information including login credentials.
    (CVE-2015-6551)

  - An unspecified flaw exists that allows a remote attacker
    to execute arbitrary RPC calls. (CVE-2015-6552)");
  script_set_attribute(attribute:"see_also", value:"https://www.veritas.com/content/support/en_US/security/VTS16-001.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Veritas NetBackup version 7.7.2 or later. Alternatively,
apply the vendor-supplied hotfix as referenced in the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-6552");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/04/26");
  script_set_attribute(attribute:"patch_publication_date", value:"2016/04/26");
  script_set_attribute(attribute:"plugin_publication_date", value:"2016/05/13");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:veritas:netbackup");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("veritas_netbackup_installed.nbin");
  script_require_keys("installed_sw/NetBackup");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

app = "NetBackup";

install = get_single_install(
  app_name : app,
  exit_if_unknown_ver : TRUE
);
path    = install["path"];
version = install["version"];
type    = install["Install type"];
patches = install["Patches"];

port = get_kb_item('SMB/transport');
if (!port) port = 445;

hotfix = NULL;
fix = NULL;

if (report_paranoia == 2) potential = TRUE;
else potential = FALSE;

if (version =~ "^7\.7\.2(\.0)?$")
{
  if (potential) hotfix = "ET3871154";
}
else if (version =~ "^7\.7\.1(\.0)?$")
{
  fix = "7.7.2";
  if (potential) hotfix = "ET3871154";
}
else if (version =~ "^7\.7(\.0)?(\.0)?$")
{
  hotfix = "ET3864869";
}
else if (version =~ "^7\.6\.1(\.[0-2])?$")
{
  if (version =~ "^7\.6\.1(\.[01])?$")
    fix = "7.6.1.2";
  hotfix = "ET3865353";
}
else if (version =~ "^7\.6\.0(\.[0-4])?$")
{
  if (version =~ "^7\.6\.0(\.[0-3])?$")
    fix = "7.6.0.4";
  hotfix = "ET3865357";
}
else if (version =~ "^(7\.5\.0(\.[0-7])?$|7\.[01]\.)")
{
  if (version =~ "^(7\.5\.0(\.[0-6])?$|7\.[01]\.)")
    fix = "7.5.0.7";
  hotfix = "ET3865362";
}
else audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);

vuln = FALSE;
missing = FALSE;

if (hotfix && (empty_or_null(patches) || hotfix >!< patches)) missing = TRUE;

if (fix && missing) # Needs upgrade + hotfix
{
  report =
    '\n  Path                  : ' + path    +
    '\n  Installed version     : ' + version +
    '\n  Installed type        : ' + type    +
    '\n  Minimum fixed version : ' + fix     +
    '\n  Missing hotfix        : ' + hotfix  + '\n';
  vuln = TRUE;
}
else if (fix) # Just needs upgrade
{
  report =
    '\n  Path                  : ' + path    +
    '\n  Installed version     : ' + version +
    '\n  Installed type        : ' + type    +
    '\n  Minimum fixed version : ' + fix     + '\n';
  vuln = TRUE;
}
else if (missing) # Missing hotfix
{
  report =
    '\n  Path              : ' + path    +
    '\n  Installed version : ' + version +
    '\n  Installed type    : ' + type    +
    '\n  Missing hotfix    : ' + hotfix  + '\n';
  vuln = TRUE;
}

if (potential)
{
  report += '\n  Please note that this hotfix only applies in environments where the Java' +
            '\n  interface is used to communicate with backend systems.\n';
}

if (vuln)
{
  if (report_verbosity > 0) security_hole(port:0, extra:report);
  else security_hole(0);
}
else audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);
VendorProductVersionCPE
veritasnetbackupcpe:/a:veritas:netbackup

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

76.7%

Related for VERITAS_NETBACKUP_VTS16-001.NASL