Vulnerability Note VU#620497

VERITAS Storage Exec DCOM servers contain multiple buffer overflows

Original Release date: 22 Sep 2005 | Last revised: 22 Sep 2005


VERITAS Storage Exec contains several buffer overflows, which may allow a remote attacker to execute arbitrary code on a vulnerable system.


VERITAS Storage Exec is software package that performs storage management. Multiple DCOM server components provided by Storage Exec contain buffer overflow vulnerabilities. These DCOM server components are accessible by their associated ActiveX controls.


By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.


Apply a patch or upgrade

This issue is addressed by VERITAS Storage Exec 5.3 Hotfix 9.

Disable ActiveX

Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) will remove an attack vector for this vulnerability. Instructions for disabling ActiveX in the Internet Zone can be found in the Malicious Web Scripts FAQ.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Symantec, Inc.Affected21 Sep 200521 Sep 2005
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Symantec for reporting this vulnerability, who in turn credit Mark Litchfield of NGSSoftware.

This document was written by Will Dormann.

Other Information

  • CVE IDs: Unknown
  • Date Public: 20 Sep 2005
  • Date First Published: 22 Sep 2005
  • Date Last Updated: 22 Sep 2005
  • Severity Metric: 14.34
  • Document Revision: 9


If you have feedback, comments, or additional information about this vulnerability, please send us email.