CERTA-2005-AVI-024

Vulnerability from certfr_avis - Published: 2005-01-24 - Updated: 2005-01-24

None

Description

Veritas Backup Exec est un serveur de sauvegarde.

Une vulnérabilité a été découverte dans la fonction de réception et de traitement des requêtes d'enregistrement. La requête d'enregistrement contient le nom de machine et le port du client qui veut se connecter. En donnant un nom de machine très long, un utilisateur mal intentionné qui se connecte sur le serveur Backup Exec peut exécuter du code arbitraire à distance avec les droits du service Backup Exec (généralement administrateur de domaine).

Contournement provisoire

Filtrer le port 6101/tcp au niveau des pare-feux.

Solution

Appliquer le correctif (cf. section Documentation)

Veritas Backup Exec versions 8.6 et 9.x.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003e\u003cTT\u003eVeritas Backup Exec\u003c/TT\u003e versions 8.6 et 9.x.\u003c/P\u003e",
  "content": "## Description\n\nVeritas Backup Exec est un serveur de sauvegarde.\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans la fonction de r\u00e9ception et de\ntraitement des requ\u00eates d\u0027enregistrement. La requ\u00eate d\u0027enregistrement\ncontient le nom de machine et le port du client qui veut se connecter.\nEn donnant un nom de machine tr\u00e8s long, un utilisateur mal intentionn\u00e9\nqui se connecte sur le serveur Backup Exec peut ex\u00e9cuter du code\narbitraire \u00e0 distance avec les droits du service Backup Exec\n(g\u00e9n\u00e9ralement administrateur de domaine).\n\n## Contournement provisoire\n\nFiltrer le port 6101/tcp au niveau des pare-feux.\n\n## Solution\n\nAppliquer le correctif (cf. section Documentation)\n",
  "cves": [],
  "initial_release_date": "2005-01-24T00:00:00",
  "last_revision_date": "2005-01-24T00:00:00",
  "links": [
    {
      "title": "Correctif pour la version 9.1.4691 :",
      "url": "http://support.veritas.com/docs/273420"
    },
    {
      "title": "Correctif pour la version 9.0.4454 :",
      "url": "http://support.veritas.com/docs/274298"
    },
    {
      "title": "Correctif pour la version 8.60.3878 :",
      "url": "http://support.veritas.com/docs/273850"
    }
  ],
  "reference": "CERTA-2005-AVI-024",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-01-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 de Veritas Backup Exec",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 273419 de Veritas",
      "url": "http://support.veritas.com/docs/273419"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…