search menu icon-carat-right cmu-wordmark

CERT Coordination Center


VERITAS Backup Exec Remote Agent fails to properly validate authentication requests

Vulnerability Note VU#492105

Original Release Date: 2005-06-24 | Last Revised: 2005-07-22

Overview

Backup Exec Remote Agent for Windows Servers contains a buffer overflow vulnerability due to incorrect validation on authentication requests.

Description

VERITAS Backup Exec is a data backup and recovery solution with support for over the network backup. The VERITAS Backup Exec Agent runs on systems to be backed up listening on TCP port 10000 and is responsible for accepting connections from the backup server when a backup is to occur.

The Backup Exec Remote Agent for Windows Servers contains a buffer overflow vulnerability due to incorrect validation on authentication requests, allowing a remote attacker to execute arbitrary code.

For more details on the vulnerability, see the iDefense security advisory:

http://www.idefense.com/application/poi/display?id=272&type=vulnerabilities.

For information about affected software versions and patching please the VERITAS Software Security Advisory.

VERITAS Software has released information about this and five other security issues affecting VERITAS Backup Exec for Windows and Netware Servers. For more information about this specific vulnerability please see:

VERITAS Software Security Advisory VX05-002 available from http://seer.support.veritas.com/docs/276604.htm.

Information on the other vulnerabilities along with patch details can be found at:

http://seer.support.veritas.com/docs/277428.htm.

NOTE: We are aware of publicly available exploit code circulating in the wild and have received credible reports of compromise. Additionally, we can confirm significant increases in the levels of network activity directed at TCP port 10000 from the evening of June 25, 2005.

Impact

A remote attacker can execute arbitrary code on computers where the Remote Agent is installed and gain administrative control. As the Backup Exec Remote Agent may be running on workstations as well as servers, this vulnerability may provide greater opportunity for attack than the other vulnerabilities identified above.

Solution

Apply a patch from the vendor. See http://seer.support.veritas.com/docs/276604.htm for details.


Workaround

Use firewalls to limit connectivity so that only the backup server(s) can connect to the systems being backed up. The standard port for this service is port 10000.

At minimum, some basic protection should be in effect at the network boundaries. Individual installations may operate on nonstandard ports, which should be taken into account when developing network traffic filtering rules.

Note: even if patching can be done quickly, the above workaround measures should be considered as part of a defense-in-depth strategy for protecting your systems.

Vendor Information

492105
Expand all

Veritas SOFTWARE

Updated:  June 24, 2005

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

VERITAS Software released information about this vulnerability. See their security bulletin for details:

http://seer.support.veritas.com/docs/276604.htm

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

VERITAS Software in its advisory states: "VERITAS Software appreciates the cooperation of Pedram Amini, iDEFENSE Labs in identifying this issue and coordinating with VERITAS Software in the resolution process."

This document was written by Robert Mead based on information in the VERITAS Software and iDefense advisories.

Other Information

CVE IDs: CVE-2005-0773
Severity Metric: 39.91
Date Public: 2005-06-22
Date First Published: 2005-06-24
Date Last Updated: 2005-07-22 15:55 UTC
Document Revision: 18

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.