CERTA-2008-AVI-559

Vulnerability from certfr_avis - Published: 2008-11-20 - Updated: 2008-11-20

De multiples vulnérabilités dans Symantec Backup Exec for Windows Server permettent de contourner le mécanisme d'authentification et d'exécuter du code arbitraire.

Description

De multiples vulnérabilités permettent de contourner le mécanisme d'authentification des agents Symantec Backup Exec. Une personne malintentionnée peut ainsi récupérer ou effacer des fichiers sur la machine attaquée.

Une vulnérabilité de type débordement de mémoire dans le protocole de gestion des données permet à un utilisateur authentifié d'exécuter du code arbitraire.

La combinaison de ces vulnérabilités permet à une personne malveillante d'exécuter du code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Symantec N/A Symantec Backup Exec for Windows Server version 11d build 6235.
Symantec N/A Symantec Backup Exec for Windows Server version 11d build 7170 ;
Symantec N/A Symantec Backup Exec for Windows Server version 12 build 1364 ;
Symantec N/A Symantec Backup Exec for Windows Server version 12.5 build 2213 ;
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Symantec Backup Exec for Windows Server version 11d build 6235.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Symantec",
          "scada": false
        }
      }
    },
    {
      "description": "Symantec Backup Exec for Windows Server version 11d build 7170 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Symantec",
          "scada": false
        }
      }
    },
    {
      "description": "Symantec Backup Exec for Windows Server version 12 build 1364 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Symantec",
          "scada": false
        }
      }
    },
    {
      "description": "Symantec Backup Exec for Windows Server version 12.5 build 2213 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Symantec",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s permettent de contourner le m\u00e9canisme\nd\u0027authentification des agents Symantec Backup Exec. Une personne\nmalintentionn\u00e9e peut ainsi r\u00e9cup\u00e9rer ou effacer des fichiers sur la\nmachine attaqu\u00e9e.\n\nUne vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire dans le protocole de\ngestion des donn\u00e9es permet \u00e0 un utilisateur authentifi\u00e9 d\u0027ex\u00e9cuter du\ncode arbitraire.\n\nLa combinaison de ces vuln\u00e9rabilit\u00e9s permet \u00e0 une personne malveillante\nd\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2008-11-20T00:00:00",
  "last_revision_date": "2008-11-20T00:00:00",
  "links": [],
  "reference": "CERTA-2008-AVI-559",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-11-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s dans \u003cspan class=\"textit\"\u003eSymantec Backup\nExec for Windows Server\u003c/span\u003e permettent de contourner le m\u00e9canisme\nd\u0027authentification et d\u0027ex\u00e9cuter du code arbitraire.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Symantec Backup Exec",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Symantec SYM08-021 du 19 novembre 2008",
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…