Lucene search

K
zdiSebastian ApeltZDI-06-050
HistoryDec 13, 2006 - 12:00 a.m.

Symantec Veritas NetBackup CONNECT_OPTIONS Buffer Overflow Vulnerability

2006-12-1300:00:00
Sebastian Apelt
www.zerodayinitiative.com
10

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.183 Low

EPSS

Percentile

96.1%

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Symantec Veritas NetBackup. Authentication is not required to exploit this vulnerability. The specific flaw exists within bpcd.exe during the parsing of overly long CONNECT_OPTIONS requests to a NetBackup Master/Media Server. When the CONNECT_OPTIONS command is parsed, the contents are copied into a stack allocated buffer without proper length checking. Exploitation of this vulnerability can lead to complete system compromise.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.183 Low

EPSS

Percentile

96.1%