Hitachi Affected

Updated:  February 16, 2005

Status

Affected

Vendor Statement

JP1/VERITAS Backup Exec is vulnerable to this issue. For vendor information please see: http://www.hitachi-support.com/security/vuls/HS05-002/index.html (Japanese) http://www.hitachi-support.com/security_e/vuls_e/HS05-002_e/index-e.html (English)

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see http://www.hitachi-support.com/security_e/vuls_e/HS05-002_e/index-e.html: Update: February 8, 2005 Vulnerability of Buffer Overflow in JP1/VERITAS Backup Exec ▪ Affected product Corrective action Product name Platform Last update HS05-002-01 JP1/VERITAS Backup Exec, VERITAS Backup Exec Windows February 8, 2005 ▪ Problem description On December 17, 2004, Veritas released their TechNote titled "Remote exploitation of a stack-based buffer overflow vulnerability in Backup Exec 8.6 and 9.x may allow the unauthorized execution of arbitrary code". On backup servers of the above products, malicious remote users can exploit the vulnerability of buffer overflow and execute arbitrary code. Revision history • February 8, 2005: This page is released. • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures.  However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice.  When referencing information, please confirm that you are referencing the latest information. • The Web pages include information about products that are developed by non-Hitachi software developers.  Vulnerability information about those products is based on the information provided or disclosed by those developers.  Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers. • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them.  Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself. • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.

NEC Corporation Affected

Updated:  February 02, 2005

Status

Affected

Vendor Statement

* VERITAS Backup Exec 8.x and 9.x - is Vulnerable. http://www.ace.comp.nec.co.jp/BackupExec/(only in Japanese) - For more detail. http://www.veritas.com/jp/support/shared/technotes/J273419/J273419.htm

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

A Vendor Statement has also been registered here: http://jvn.jp/cert/JVNVU%23907729/index.html

Veritas SOFTWARE Affected

Updated:  January 14, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see the Veritas notices posted here: http://seer.support.veritas.com/docs/273419.htm http://seer.support.veritas.com/docs/273420.htm http://seer.support.veritas.com/docs/273422.htm http://seer.support.veritas.com/docs/273850.htm