Vulnerability Note VU#492105
VERITAS Backup Exec Remote Agent fails to properly validate authentication requests
Backup Exec Remote Agent for Windows Servers contains a buffer overflow vulnerability due to incorrect validation on authentication requests.
VERITAS Backup Exec is a data backup and recovery solution with support for over the network backup. The VERITAS Backup Exec Agent runs on systems to be backed up listening on TCP port 10000 and is responsible for accepting connections from the backup server when a backup is to occur.
The Backup Exec Remote Agent for Windows Servers contains a buffer overflow vulnerability due to incorrect validation on authentication requests, allowing a remote attacker to execute arbitrary code.
For information about affected software versions and patching please the VERITAS Software Security Advisory.
VERITAS Software has released information about this and five other security issues affecting VERITAS Backup Exec for Windows and Netware Servers. For more information about this specific vulnerability please see:
Information on the other vulnerabilities along with patch details can be found at:
NOTE: We are aware of publicly available exploit code circulating in the wild and have received credible reports of compromise. Additionally, we can confirm significant increases in the levels of network activity directed at TCP port 10000 from the evening of June 25, 2005.
A remote attacker can execute arbitrary code on computers where the Remote Agent is installed and gain administrative control. As the Backup Exec Remote Agent may be running on workstations as well as servers, this vulnerability may provide greater opportunity for attack than the other vulnerabilities identified above.
Apply a patch from the vendor. See http://seer.support.veritas.com/docs/276604.htm for details.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Veritas SOFTWARE||Affected||-||24 Jun 2005|
CVSS Metrics (Learn More)
VERITAS Software in its advisory states:
"VERITAS Software appreciates the cooperation of Pedram Amini, iDEFENSE Labs in identifying this issue and coordinating with VERITAS Software in the resolution process."
This document was written by Robert Mead based on information in the VERITAS Software and iDefense advisories.
- CVE IDs: CAN-2005-0773
- Date Public: 22 Jun 2005
- Date First Published: 24 Jun 2005
- Date Last Updated: 22 Jul 2005
- Severity Metric: 39.91
- Document Revision: 18
If you have feedback, comments, or additional information about this vulnerability, please send us email.