Vulnerabilites related to symantec_veritas - backup_exec
CVE-2004-1172 (GCVE-0-2004-1172)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
References
▼ | URL | Tags |
---|---|---|
http://seer.support.veritas.com/docs/273419.htm | x_refsource_CONFIRM | |
http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php | x_refsource_MISC | |
http://www.securityfocus.com/bid/11974 | vdb-entry, x_refsource_BID | |
http://seer.support.veritas.com/docs/273850.htm | x_refsource_CONFIRM | |
http://www.kb.cert.org/vuls/id/907729 | third-party-advisory, x_refsource_CERT-VN | |
http://seer.support.veritas.com/docs/273422.htm | x_refsource_CONFIRM | |
http://secunia.com/advisories/13495/ | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18506 | vdb-entry, x_refsource_XF | |
http://seer.support.veritas.com/docs/273420.htm | x_refsource_CONFIRM | |
http://www.idefense.com/application/poi/display?id=169 | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:39:01.126Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/273419.htm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php" }, { "name": "11974", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11974" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/273850.htm" }, { "name": "VU#907729", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/907729" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/273422.htm" }, { "name": "13495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13495/" }, { "name": "netbackup-agent-browser-bo(18506)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/273420.htm" }, { "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=169" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/273419.htm" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php" }, { "name": "11974", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11974" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/273850.htm" }, { "name": "VU#907729", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/907729" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/273422.htm" }, { "name": "13495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13495/" }, { "name": "netbackup-agent-browser-bo(18506)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/273420.htm" }, { "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=169" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1172", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://seer.support.veritas.com/docs/273419.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/273419.htm" }, { "name": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php", "refsource": "MISC", "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php" }, { "name": "11974", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11974" }, { "name": "http://seer.support.veritas.com/docs/273850.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/273850.htm" }, { "name": "VU#907729", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/907729" }, { "name": "http://seer.support.veritas.com/docs/273422.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/273422.htm" }, { "name": "13495", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13495/" }, { "name": "netbackup-agent-browser-bo(18506)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506" }, { "name": "http://seer.support.veritas.com/docs/273420.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/273420.htm" }, { "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=169" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1172", "datePublished": "2004-12-22T05:00:00", "dateReserved": "2004-12-13T00:00:00", "dateUpdated": "2024-08-08T00:39:01.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2051 (GCVE-0-2005-2051)
Vulnerability from cvelistv5
Published
2005-06-26 04:00
Modified
2024-08-07 22:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
http://www.ciac.org/ciac/bulletins/p-232.shtml | third-party-advisory, government-resource, x_refsource_CIAC | |
http://www.securityfocus.com/bid/14025 | vdb-entry, x_refsource_BID | |
http://seer.support.veritas.com/docs/276606.htm | x_refsource_CONFIRM | |
http://marc.info/?l=bugtraq&m=111954711532252&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/15789 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:15:36.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "P-232", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml" }, { "name": "14025", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14025" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/276606.htm" }, { "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2" }, { "name": "15789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15789" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "P-232", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml" }, { "name": "14025", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14025" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/276606.htm" }, { "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2" }, { "name": "15789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15789" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "P-232", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml" }, { "name": "14025", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14025" }, { "name": "http://seer.support.veritas.com/docs/276606.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/276606.htm" }, { "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2" }, { "name": "15789", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15789" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2051", "datePublished": "2005-06-26T04:00:00", "dateReserved": "2005-06-26T00:00:00", "dateUpdated": "2024-08-07T22:15:36.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-1297 (GCVE-0-2006-1297)
Vulnerability from cvelistv5
Published
2006-03-19 23:00
Modified
2024-08-07 17:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to "memory errors."
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1015784 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/597 | third-party-advisory, x_refsource_SREASON | |
http://www.symantec.com/avcenter/security/Content/2006.03.17a.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/17098 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25309 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2006/0995 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/428016/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/19242 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:03:28.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1015784", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015784" }, { "name": "597", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/597" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html" }, { "name": "17098", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17098" }, { "name": "backupexec-app-memory-dos(25309)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309" }, { "name": "ADV-2006-0995", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0995" }, { "name": "20060317 Symantec Security Advisory SYM06-004", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded" }, { "name": "19242", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19242" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1015784", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015784" }, { "name": "597", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/597" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html" }, { "name": "17098", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17098" }, { "name": "backupexec-app-memory-dos(25309)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309" }, { "name": "ADV-2006-0995", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0995" }, { "name": "20060317 Symantec Security Advisory SYM06-004", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded" }, { "name": "19242", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19242" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1015784", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015784" }, { "name": "597", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/597" }, { "name": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html" }, { "name": "17098", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17098" }, { "name": "backupexec-app-memory-dos(25309)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309" }, { "name": "ADV-2006-0995", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0995" }, { "name": "20060317 Symantec Security Advisory SYM06-004", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded" }, { "name": "19242", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19242" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1297", "datePublished": "2006-03-19T23:00:00", "dateReserved": "2006-03-19T00:00:00", "dateUpdated": "2024-08-07T17:03:28.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-0771 (GCVE-0-2005-0771)
Vulnerability from cvelistv5
Published
2005-06-29 04:00
Modified
2024-08-07 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1014273 | vdb-entry, x_refsource_SECTRACK | |
http://www.kb.cert.org/vuls/id/584505 | third-party-advisory, x_refsource_CERT-VN | |
http://www.idefense.com/application/poi/display?id=269&type=vulnerabilities&flashstatus=true | third-party-advisory, x_refsource_IDEFENSE | |
http://www.us-cert.gov/cas/techalerts/TA05-180A.html | third-party-advisory, x_refsource_CERT | |
http://secunia.com/advisories/15789 | third-party-advisory, x_refsource_SECUNIA | |
http://seer.support.veritas.com/docs/277429.htm | x_refsource_CONFIRM | |
http://seer.support.veritas.com/docs/276605.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:28:28.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1014273", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014273" }, { "name": "VU#584505", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/584505" }, { "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "TA05-180A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "name": "15789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15789" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/276605.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-15T16:39:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1014273", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014273" }, { "name": "VU#584505", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/584505" }, { "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "TA05-180A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "name": "15789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15789" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/276605.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0771", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1014273", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014273" }, { "name": "VU#584505", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/584505" }, { "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "TA05-180A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "name": "15789", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15789" }, { "name": "http://seer.support.veritas.com/docs/277429.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "name": "http://seer.support.veritas.com/docs/276605.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/276605.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0771", "datePublished": "2005-06-29T04:00:00", "dateReserved": "2005-03-18T00:00:00", "dateUpdated": "2024-08-07T21:28:28.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2079 (GCVE-0-2005-2079)
Vulnerability from cvelistv5
Published
2005-06-29 04:00
Modified
2024-08-07 22:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
http://seer.support.veritas.com/docs/276607.htm | x_refsource_CONFIRM | |
http://www.kb.cert.org/vuls/id/352625 | third-party-advisory, x_refsource_CERT-VN | |
http://seer.support.veritas.com/docs/277429.htm | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA05-180A.html | third-party-advisory, x_refsource_CERT | |
http://www.securityfocus.com/bid/14023 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/15789 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:15:37.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/276607.htm" }, { "name": "VU#352625", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/352625" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "name": "TA05-180A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "name": "14023", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14023" }, { "name": "15789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15789" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-03-31T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/276607.htm" }, { "name": "VU#352625", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/352625" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "name": "TA05-180A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "name": "14023", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14023" }, { "name": "15789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15789" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2079", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://seer.support.veritas.com/docs/276607.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/276607.htm" }, { "name": "VU#352625", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/352625" }, { "name": "http://seer.support.veritas.com/docs/277429.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "name": "TA05-180A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "name": "14023", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14023" }, { "name": "15789", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15789" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2079", "datePublished": "2005-06-29T04:00:00", "dateReserved": "2005-06-29T00:00:00", "dateUpdated": "2024-08-07T22:15:37.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2611 (GCVE-0-2005-2611)
Vulnerability from cvelistv5
Published
2005-08-17 04:00
Modified
2024-08-07 22:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA05-224A.html | third-party-advisory, x_refsource_CERT | |
http://www.securityfocus.com/bid/14551 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/16403 | third-party-advisory, x_refsource_SECUNIA | |
http://www.kb.cert.org/vuls/id/378957 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2005/1387 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21793 | vdb-entry, x_refsource_XF | |
http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1014662 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:30:01.838Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA05-224A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "name": "14551", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14551" }, { "name": "16403", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16403" }, { "name": "VU#378957", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "name": "ADV-2005-1387", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "name": "backupexec-ndmp-gain-access(21793)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "name": "1014662", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014662" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TA05-224A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "name": "14551", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14551" }, { "name": "16403", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16403" }, { "name": "VU#378957", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "name": "ADV-2005-1387", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "name": "backupexec-ndmp-gain-access(21793)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "name": "1014662", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014662" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2611", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA05-224A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "name": "14551", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14551" }, { "name": "16403", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16403" }, { "name": "VU#378957", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/378957" }, { "name": "ADV-2005-1387", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "name": "backupexec-ndmp-gain-access(21793)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "name": "1014662", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014662" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2611", "datePublished": "2005-08-17T04:00:00", "dateReserved": "2005-08-17T00:00:00", "dateUpdated": "2024-08-07T22:30:01.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-1298 (GCVE-0-2006-1298)
Vulnerability from cvelistv5
Published
2006-03-19 23:00
Modified
2024-08-07 17:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/428223/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.symantec.com/avcenter/security/Content/2006.03.17b.html | x_refsource_CONFIRM | |
http://support.veritas.com/docs/282254 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2006/0996 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1015785 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/19242 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25310 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/17096 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:03:28.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060320 Symantec Security Advisory, SYM06-005", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.veritas.com/docs/282254" }, { "name": "ADV-2006-0996", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0996" }, { "name": "1015785", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015785" }, { "name": "19242", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19242" }, { "name": "backupexec-bengine-format-string(25310)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310" }, { "name": "17096", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17096" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20060320 Symantec Security Advisory, SYM06-005", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.veritas.com/docs/282254" }, { "name": "ADV-2006-0996", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0996" }, { "name": "1015785", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015785" }, { "name": "19242", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19242" }, { "name": "backupexec-bengine-format-string(25310)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310" }, { "name": "17096", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17096" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1298", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060320 Symantec Security Advisory, SYM06-005", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded" }, { "name": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html" }, { "name": "http://support.veritas.com/docs/282254", "refsource": "CONFIRM", "url": "http://support.veritas.com/docs/282254" }, { "name": "ADV-2006-0996", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0996" }, { "name": "1015785", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015785" }, { "name": "19242", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19242" }, { "name": "backupexec-bengine-format-string(25310)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310" }, { "name": "17096", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17096" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1298", "datePublished": "2006-03-19T23:00:00", "dateReserved": "2006-03-19T00:00:00", "dateUpdated": "2024-08-07T17:03:28.944Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-4128 (GCVE-0-2006-4128)
Vulnerability from cvelistv5
Published
2006-08-14 23:00
Modified
2024-08-07 18:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1016683 | vdb-entry, x_refsource_SECTRACK | |
http://seer.entsupport.symantec.com/docs/284623.htm | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28336 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/443037/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.kb.cert.org/vuls/id/647796 | third-party-advisory, x_refsource_CERT-VN | |
http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html | x_refsource_CONFIRM | |
http://securityreason.com/securityalert/1380 | third-party-advisory, x_refsource_SREASON | |
http://www.vupen.com/english/advisories/2006/3266 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/19479 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/21472 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:57:46.261Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1016683", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016683" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.entsupport.symantec.com/docs/284623.htm" }, { "name": "backupexec-rpc-interface-bo(28336)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336" }, { "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded" }, { "name": "VU#647796", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/647796" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html" }, { "name": "1380", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1380" }, { "name": "ADV-2006-3266", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3266" }, { "name": "19479", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19479" }, { "name": "21472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21472" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1016683", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016683" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.entsupport.symantec.com/docs/284623.htm" }, { "name": "backupexec-rpc-interface-bo(28336)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336" }, { "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded" }, { "name": "VU#647796", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/647796" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html" }, { "name": "1380", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1380" }, { "name": "ADV-2006-3266", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3266" }, { "name": "19479", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19479" }, { "name": "21472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21472" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1016683", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016683" }, { "name": "http://seer.entsupport.symantec.com/docs/284623.htm", "refsource": "CONFIRM", "url": "http://seer.entsupport.symantec.com/docs/284623.htm" }, { "name": "backupexec-rpc-interface-bo(28336)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336" }, { "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded" }, { "name": "VU#647796", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/647796" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html" }, { "name": "1380", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1380" }, { "name": "ADV-2006-3266", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3266" }, { "name": "19479", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19479" }, { "name": "21472", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21472" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4128", "datePublished": "2006-08-14T23:00:00", "dateReserved": "2006-08-14T00:00:00", "dateUpdated": "2024-08-07T18:57:46.261Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1117 (GCVE-0-2002-1117)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Veritas Backup Exec 8.5 and earlier requires that the "RestrictAnonymous" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=103134395124579&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036 | vdb-entry, signature, x_refsource_OVAL | |
http://www.osvdb.org/8230 | vdb-entry, x_refsource_OSVDB | |
http://marc.info/?l=bugtraq&m=103134930629683&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10093 | vdb-entry, x_refsource_XF | |
http://seer.support.veritas.com/docs/238618.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:12:17.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020906 Veritas Backup Exec opens networks for NetBIOS based attacks?", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=103134395124579\u0026w=2" }, { "name": "oval:org.mitre.oval:def:1036", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036" }, { "name": "8230", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/8230" }, { "name": "20020906 UPDATE: (Was Veritas Backup Exec opens networks for NetBIOS based attacks?)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=103134930629683\u0026w=2" }, { "name": "veritas-backupexec-restrictanonymous-zero(10093)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10093" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/238618.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Veritas Backup Exec 8.5 and earlier requires that the \"RestrictAnonymous\" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-11-01T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020906 Veritas Backup Exec opens networks for NetBIOS based attacks?", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=103134395124579\u0026w=2" }, { "name": "oval:org.mitre.oval:def:1036", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036" }, { "name": "8230", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/8230" }, { "name": "20020906 UPDATE: (Was Veritas Backup Exec opens networks for NetBIOS based attacks?)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=103134930629683\u0026w=2" }, { "name": "veritas-backupexec-restrictanonymous-zero(10093)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10093" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/238618.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Veritas Backup Exec 8.5 and earlier requires that the \"RestrictAnonymous\" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020906 Veritas Backup Exec opens networks for NetBIOS based attacks?", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103134395124579\u0026w=2" }, { "name": "oval:org.mitre.oval:def:1036", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036" }, { "name": "8230", "refsource": "OSVDB", "url": "http://www.osvdb.org/8230" }, { "name": "20020906 UPDATE: (Was Veritas Backup Exec opens networks for NetBIOS based attacks?)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103134930629683\u0026w=2" }, { "name": "veritas-backupexec-restrictanonymous-zero(10093)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10093" }, { "name": "http://seer.support.veritas.com/docs/238618.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/238618.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1117", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-09-06T00:00:00", "dateUpdated": "2024-08-08T03:12:17.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-0773 (GCVE-0-2005-0773)
Vulnerability from cvelistv5
Published
2005-06-29 04:00
Modified
2024-08-07 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/492105 | third-party-advisory, x_refsource_CERT-VN | |
http://securitytracker.com/id?1014273 | vdb-entry, x_refsource_SECTRACK | |
http://www.osvdb.org/17624 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/14022 | vdb-entry, x_refsource_BID | |
http://seer.support.veritas.com/docs/277429.htm | x_refsource_CONFIRM | |
http://seer.support.veritas.com/docs/276604.htm | x_refsource_CONFIRM | |
http://www.idefense.com/application/poi/display?id=272&type=vulnerabilities&flashstatus=true | third-party-advisory, x_refsource_IDEFENSE | |
http://www.us-cert.gov/cas/techalerts/TA05-180A.html | third-party-advisory, x_refsource_CERT | |
http://secunia.com/advisories/15789 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:28:28.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#492105", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/492105" }, { "name": "1014273", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014273" }, { "name": "17624", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/17624" }, { "name": "14022", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14022" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/276604.htm" }, { "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "TA05-180A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "name": "15789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15789" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-03-14T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#492105", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/492105" }, { "name": "1014273", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014273" }, { "name": "17624", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/17624" }, { "name": "14022", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14022" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/276604.htm" }, { "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "TA05-180A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "name": "15789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15789" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0773", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#492105", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/492105" }, { "name": "1014273", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014273" }, { "name": "17624", "refsource": "OSVDB", "url": "http://www.osvdb.org/17624" }, { "name": "14022", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14022" }, { "name": "http://seer.support.veritas.com/docs/277429.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "name": "http://seer.support.veritas.com/docs/276604.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/276604.htm" }, { "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "TA05-180A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "name": "15789", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15789" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0773", "datePublished": "2005-06-29T04:00:00", "dateReserved": "2005-03-18T00:00:00", "dateUpdated": "2024-08-07T21:28:28.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2080 (GCVE-0-2005-2080)
Vulnerability from cvelistv5
Published
2005-06-29 04:00
Modified
2024-08-07 22:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/14026 | vdb-entry, x_refsource_BID | |
http://seer.support.veritas.com/docs/277429.htm | x_refsource_CONFIRM | |
http://seer.support.veritas.com/docs/276608.htm | x_refsource_CONFIRM | |
http://secunia.com/advisories/15789 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:15:37.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "14026", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14026" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/276608.htm" }, { "name": "15789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15789" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-03-31T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "14026", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14026" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/276608.htm" }, { "name": "15789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15789" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2080", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "14026", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14026" }, { "name": "http://seer.support.veritas.com/docs/277429.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "name": "http://seer.support.veritas.com/docs/276608.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/276608.htm" }, { "name": "15789", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15789" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2080", "datePublished": "2005-06-29T04:00:00", "dateReserved": "2005-06-29T00:00:00", "dateUpdated": "2024-08-07T22:15:37.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2006-03-19 23:02
Modified
2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | 9.1 | |
symantec_veritas | backup_exec | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "BD6DC805-9CAB-4CA2-9F69-999F6832B7E6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec." } ], "evaluatorSolution": "This vulnerability can only be exploited if the \u0027job log\u0027 mode is set to \"Full Detailed\" (aka Full Details). Other older versions of Windows Server (those that have been End-Of-Life\u0027d) should be upgraded to the latest patch of one of the current versions listed above.", "id": "CVE-2006-1298", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-03-19T23:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19242" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015785" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://support.veritas.com/docs/282254" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/17096" }, { "source": "cve@mitre.org", "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0996" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://support.veritas.com/docs/282254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/17096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Veritas Backup Exec 8.5 and earlier requires that the "RestrictAnonymous" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:*:*:*:*:*:*:*:*", "matchCriteriaId": "B15222C4-02DE-4433-BF16-947CC807B0F7", "versionEndIncluding": "8.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Veritas Backup Exec 8.5 and earlier requires that the \"RestrictAnonymous\" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares." } ], "id": "CVE-2002-1117", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-04T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=103134395124579\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=103134930629683\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://seer.support.veritas.com/docs/238618.htm" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/8230" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10093" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=103134395124579\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=103134930629683\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seer.support.veritas.com/docs/238618.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/8230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-06-23 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | 9.0_rev.4367 | |
symantec_veritas | backup_exec | 9.0_rev.4454 | |
symantec_veritas | backup_exec | 9.1_rev.4691 | |
symantec_veritas | backup_exec | 10.0_rev.5484 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*", "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*", "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*", "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*", "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106." } ], "id": "CVE-2005-0771", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-06-23T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15789" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1014273" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/276605.htm" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "source": "cve@mitre.org", "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584505" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1014273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/276605.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-06-28 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | 9.0 | |
symantec_veritas | backup_exec | 9.0_rev.4367 | |
symantec_veritas | backup_exec | 9.0_rev.4454 | |
symantec_veritas | backup_exec | 9.1 | |
symantec_veritas | backup_exec | 9.1_rev.4691 | |
symantec_veritas | backup_exec | 10.0 | |
symantec_veritas | backup_exec | 10.0_rev.5484 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "357967B9-D397-459B-A71A-FEBE0BCB8B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*", "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*", "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*", "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "B94533F3-8954-4772-92A6-7E3EE29D3162", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*", "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code." } ], "id": "CVE-2005-2051", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-06-28T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/15789" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/276606.htm" }, { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/14025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/15789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/276606.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/14025" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-06-29 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | 9.0 | |
symantec_veritas | backup_exec | 9.0.4019 | |
symantec_veritas | backup_exec | 9.0.4170 | |
symantec_veritas | backup_exec | 9.0.4172 | |
symantec_veritas | backup_exec | 9.0.4174 | |
symantec_veritas | backup_exec | 9.0.4202 | |
symantec_veritas | backup_exec | 9.1 | |
symantec_veritas | backup_exec | 9.1.306 | |
symantec_veritas | backup_exec | 9.1.307 | |
symantec_veritas | backup_exec | 9.1.1067.2 | |
symantec_veritas | backup_exec | 9.1.1067.3 | |
symantec_veritas | backup_exec | 9.1.1127.1 | |
symantec_veritas | backup_exec | 9.1.1151.1 | |
symantec_veritas | backup_exec | 9.1.1152 | |
symantec_veritas | backup_exec | 9.1.1152.4 | |
symantec_veritas | backup_exec | 9.1.1154 | |
symantec_veritas | backup_exec | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "357967B9-D397-459B-A71A-FEBE0BCB8B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*", "matchCriteriaId": "1D53EB23-4971-408E-A43F-009698C403A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4170:*:*:*:*:*:*:*", "matchCriteriaId": "2F763B05-25F3-42B6-A90E-2454910B6AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4172:*:*:*:*:*:*:*", "matchCriteriaId": "E4609B0F-3F5C-464E-92B1-ED6AF3C4FB75", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4174:*:*:*:*:*:*:*", "matchCriteriaId": "67D899BF-F90C-43AD-8C17-CF59EE116BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4202:*:*:*:*:*:*:*", "matchCriteriaId": "EB1DD40C-E044-45D7-919E-6DC0749FEF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.306:*:*:*:*:*:*:*", "matchCriteriaId": "1C1CD60F-847D-41D1-96C2-993E894F3EB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.307:*:*:*:*:*:*:*", "matchCriteriaId": "376EA812-8D27-4321-96CC-36848FE8856D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.2:*:*:*:*:*:*:*", "matchCriteriaId": "571BAEAC-E97D-4127-8C44-00206714587A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D17C351-CC27-4F3C-8024-0D7461534797", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1127.1:*:*:*:*:*:*:*", "matchCriteriaId": "EA711692-B9F2-4898-998D-7916C6572EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1151.1:*:*:*:*:*:*:*", "matchCriteriaId": "25B4C81C-2706-461F-9516-A4CB055FE865", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152:*:*:*:*:*:*:*", "matchCriteriaId": "183AE69A-BFCA-4AA4-AB08-18189AF7EE2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152.4:*:*:*:*:*:*:*", "matchCriteriaId": "2301AB87-1080-4C9E-81EC-91040AF882A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1154:*:*:*:*:*:*:*", "matchCriteriaId": "B312041E-57BE-48EF-B1FD-8F8B85D5AC89", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "B94533F3-8954-4772-92A6-7E3EE29D3162", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server." } ], "id": "CVE-2005-2080", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-06-29T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15789" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/276608.htm" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/14026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/276608.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/14026" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-08-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | 9.0_rev.4367 | |
symantec_veritas | backup_exec | 9.0_rev.4454 | |
symantec_veritas | backup_exec | 9.1_rev.4691 | |
symantec_veritas | backup_exec | 10.0_rev.5484 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*", "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*", "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*", "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*", "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Admin Plus Pack Option for VERITAS Backup Exec 9.0 hasta 10.0 para Windows Servers permite que atacantes remotos ejecuten c\u00f3digo arbitrario." } ], "id": "CVE-2005-2079", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15789" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/276607.htm" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/352625" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/14023" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/276607.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/352625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/14023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-08-14 23:04
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | 9.1 | |
symantec_veritas | backup_exec | 9.1_build9.1.4691 | |
symantec_veritas | backup_exec | 9.2 | |
symantec_veritas | backup_exec | 10.0 | |
symantec_veritas | backup_exec | 10.0_build10.0.5484 | |
symantec_veritas | backup_exec | 10.0_build10.0.5520 | |
symantec_veritas | backup_exec | 10.1 | |
symantec_veritas | backup_exec | 10.1.325.6301 | |
symantec_veritas | backup_exec | 10.1.326.1401 | |
symantec_veritas | backup_exec | 10.1.326.2501 | |
symantec_veritas | backup_exec | 10.1.326.3301 | |
symantec_veritas | backup_exec | 10.1.327.401 | |
symantec_veritas | backup_exec | 10.1_build10.1.5629 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:windows_server_remote_agent:*:*:*:*:*", "matchCriteriaId": "E11FD33B-E9E1-4C1D-A3C2-622A99637B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_build9.1.4691:*:windows_server_remote_agent:*:*:*:*:*", "matchCriteriaId": "0113460A-3653-471F-8CBC-DADDB8019424", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.2:*:windows_server_remote_agent:*:*:*:*:*", "matchCriteriaId": "F0FE14BC-EC55-41D8-A3B2-01E5D713C537", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:windows_server_remote_agent:*:*:*:*:*", "matchCriteriaId": "4D552062-F18D-4800-9618-C1A5F967F7C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_build10.0.5484:*:windows_server_remote_agent:*:*:*:*:*", "matchCriteriaId": "398B0C1C-3969-4664-A175-AF149DE701BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_build10.0.5520:*:windows_server_remote_agent:*:*:*:*:*", "matchCriteriaId": "CA98695D-2217-419A-8CEA-8EE30FEF6A95", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1:*:windows_server_remote_agent:*:*:*:*:*", "matchCriteriaId": "D1C409F7-A4AA-4693-AFB2-8DCA9E9AB928", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.325.6301:*:*:*:*:*:*:*", "matchCriteriaId": "62FDC7A0-1BDF-4BE6-ACC0-9508092A07C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.326.1401:*:*:*:*:*:*:*", "matchCriteriaId": "8B46764B-6B34-414D-AD39-61A0C645F940", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.326.2501:*:*:*:*:*:*:*", "matchCriteriaId": "08E7CF0C-3200-4976-B57B-91BDB8F50C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.326.3301:*:*:*:*:*:*:*", "matchCriteriaId": "4F47DBE4-186F-4064-8FEF-FA36050B2074", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.327.401:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC413A-B3BA-4AD4-9BD4-0BFC4355451E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1_build10.1.5629:*:windows_server_remote_agent:*:*:*:*:*", "matchCriteriaId": "5CAE4CB5-9716-4C34-A7F2-BA8133ECBA38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message." }, { "lang": "es", "value": "M\u00faliples desbordamientos de b\u00fafer en Symantec VERITAS Backup Exec para Netware Server Remote Agent para Windows Server 9.1 y 9.2 (todas las construcciones), Backup Exec Continuous Protection Server Remote Agent para Windows Server 10.1 (10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, y 10.1.327.401), y Backup Exec para Windows Server y Remote Agent 9.1 (9.1.4691), 10.0 (10.0.5484 y 10.0.5520), y 10.1 (10.1.5629) permite a un atacante remoto provocar denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de mensajes RPC manipulados." } ], "id": "CVE-2006-4128", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-14T23:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21472" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1380" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016683" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://seer.entsupport.symantec.com/docs/284623.htm" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/647796" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19479" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3266" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016683" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://seer.entsupport.symantec.com/docs/284623.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/647796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-03-19 23:02
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to "memory errors."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | netware_server_9.1 | |
symantec_veritas | backup_exec | netware_server_9.2 | |
symantec_veritas | backup_exec_remote_agent | netware_server_9.1 | |
symantec_veritas | backup_exec_remote_agent | netware_server_9.2 | |
symantec_veritas | backup_exec_remote_agent | unix_linux_server_10.1 | |
symantec_veritas | backup_exec_remote_agent | windows_server_9.1 | |
symantec_veritas | backup_exec_remote_agent | windows_server_10.0 | |
symantec_veritas | backup_exec_remote_agent | windows_server_10.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_server_9.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC0A3E26-7FE0-4780-A202-8CEF4F752DE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_server_9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0C4BEBA2-8AA0-48E4-BE26-532837813267", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server_9.1:*:*:*:*:*:*:*", "matchCriteriaId": "71E2448A-4501-487C-A194-8144F8A14E79", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server_9.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC86B153-9696-4373-9E30-F7793BB4F3BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server_10.1:*:*:*:*:*:*:*", "matchCriteriaId": "7836C087-7F95-4264-AAB6-706AA6E9AAE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E41CFAC-A992-435A-8DED-E49C2284AD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_10.0:*:*:*:*:*:*:*", "matchCriteriaId": "81B58325-B79E-4C91-9BF3-601D8CB17037", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_10.1:*:*:*:*:*:*:*", "matchCriteriaId": "FCA85325-2513-4C12-93A2-31EF7422A617", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\"" } ], "id": "CVE-2006-1297", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-03-19T23:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19242" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/597" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015784" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/17098" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0995" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | 8.0 | |
symantec_veritas | backup_exec | 8.5 | |
symantec_veritas | backup_exec | 8.6 | |
symantec_veritas | backup_exec | 9.0 | |
symantec_veritas | backup_exec | 9.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D3D2DE8-D26F-4EB7-895F-F0764749395D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "4C9359E8-65FF-4C46-8CB4-1E699EE767E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "FFDC7581-00EF-45FB-A50C-C1ED1EA7E247", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "357967B9-D397-459B-A71A-FEBE0BCB8B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname." } ], "id": "CVE-2004-1172", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-01-10T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/13495/" }, { "source": "cve@mitre.org", "url": "http://seer.support.veritas.com/docs/273419.htm" }, { "source": "cve@mitre.org", "url": "http://seer.support.veritas.com/docs/273420.htm" }, { "source": "cve@mitre.org", "url": "http://seer.support.veritas.com/docs/273422.htm" }, { "source": "cve@mitre.org", "url": "http://seer.support.veritas.com/docs/273850.htm" }, { "source": "cve@mitre.org", "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php" }, { "source": "cve@mitre.org", "url": "http://www.idefense.com/application/poi/display?id=169" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/907729" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11974" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/13495/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seer.support.veritas.com/docs/273419.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seer.support.veritas.com/docs/273420.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seer.support.veritas.com/docs/273422.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seer.support.veritas.com/docs/273850.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.idefense.com/application/poi/display?id=169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/907729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-06-18 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | 9.0.4019 | |
symantec_veritas | backup_exec | 9.0.4170 | |
symantec_veritas | backup_exec | 9.0.4172 | |
symantec_veritas | backup_exec | 9.0.4174 | |
symantec_veritas | backup_exec | 9.0.4202 | |
symantec_veritas | backup_exec | 9.0_rev.4367 | |
symantec_veritas | backup_exec | 9.0_rev.4367_sp1 | |
symantec_veritas | backup_exec | 9.0_rev.4454 | |
symantec_veritas | backup_exec | 9.0_rev.4454_sp1 | |
symantec_veritas | backup_exec | 9.1.306 | |
symantec_veritas | backup_exec | 9.1.307 | |
symantec_veritas | backup_exec | 9.1.1067.2 | |
symantec_veritas | backup_exec | 9.1.1067.3 | |
symantec_veritas | backup_exec | 9.1.1127.1 | |
symantec_veritas | backup_exec | 9.1.1151.1 | |
symantec_veritas | backup_exec | 9.1.1152 | |
symantec_veritas | backup_exec | 9.1.1152.4 | |
symantec_veritas | backup_exec | 9.1.1154 | |
symantec_veritas | backup_exec | 9.1_rev.4691 | |
symantec_veritas | backup_exec | 9.1_rev.4691_sp2 | |
symantec_veritas | backup_exec | 10.0_rev.5484 | |
symantec_veritas | backup_exec | 10.0_rev.5484_sp1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*", "matchCriteriaId": "1D53EB23-4971-408E-A43F-009698C403A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4170:*:*:*:*:*:*:*", "matchCriteriaId": "2F763B05-25F3-42B6-A90E-2454910B6AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4172:*:*:*:*:*:*:*", "matchCriteriaId": "E4609B0F-3F5C-464E-92B1-ED6AF3C4FB75", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4174:*:*:*:*:*:*:*", "matchCriteriaId": "67D899BF-F90C-43AD-8C17-CF59EE116BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4202:*:*:*:*:*:*:*", "matchCriteriaId": "EB1DD40C-E044-45D7-919E-6DC0749FEF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*", "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "84F669C0-D20D-49B1-A486-6DE6FF8A186F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*", "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "6B53EE99-ACFE-42FD-BA9A-379913E4D329", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.306:*:*:*:*:*:*:*", "matchCriteriaId": "1C1CD60F-847D-41D1-96C2-993E894F3EB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.307:*:*:*:*:*:*:*", "matchCriteriaId": "376EA812-8D27-4321-96CC-36848FE8856D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.2:*:*:*:*:*:*:*", "matchCriteriaId": "571BAEAC-E97D-4127-8C44-00206714587A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D17C351-CC27-4F3C-8024-0D7461534797", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1127.1:*:*:*:*:*:*:*", "matchCriteriaId": "EA711692-B9F2-4898-998D-7916C6572EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1151.1:*:*:*:*:*:*:*", "matchCriteriaId": "25B4C81C-2706-461F-9516-A4CB055FE865", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152:*:*:*:*:*:*:*", "matchCriteriaId": "183AE69A-BFCA-4AA4-AB08-18189AF7EE2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152.4:*:*:*:*:*:*:*", "matchCriteriaId": "2301AB87-1080-4C9E-81EC-91040AF882A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1154:*:*:*:*:*:*:*", "matchCriteriaId": "B312041E-57BE-48EF-B1FD-8F8B85D5AC89", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*", "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691_sp2:*:*:*:*:*:*:*", "matchCriteriaId": "2FD59ED0-F1FD-42BD-9078-3A603FC4B899", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*", "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "52E569BF-72BD-49DE-8946-E575C677F06B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument." } ], "id": "CVE-2005-0773", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-06-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15789" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1014273" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/276604.htm" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/492105" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/17624" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/14022" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1014273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/276604.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://seer.support.veritas.com/docs/277429.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/492105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/17624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/14022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-08-17 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | netware_servers_9.0.4019 | |
symantec_veritas | backup_exec | netware_servers_9.0.4170 | |
symantec_veritas | backup_exec | netware_servers_9.0.4172 | |
symantec_veritas | backup_exec | netware_servers_9.0.4174 | |
symantec_veritas | backup_exec | netware_servers_9.0.4202 | |
symantec_veritas | backup_exec | netware_servers_9.1.306 | |
symantec_veritas | backup_exec | netware_servers_9.1.307 | |
symantec_veritas | backup_exec | netware_servers_9.1.1067_.2 | |
symantec_veritas | backup_exec | netware_servers_9.1.1067_.3 | |
symantec_veritas | backup_exec | netware_servers_9.1.1127_.1 | |
symantec_veritas | backup_exec | netware_servers_9.1.1151_.1 | |
symantec_veritas | backup_exec | netware_servers_9.1.1152 | |
symantec_veritas | backup_exec | netware_servers_9.1.1152_.4 | |
symantec_veritas | backup_exec | netware_servers_9.1.1154 | |
symantec_veritas | backup_exec | netware_servers_9.1.1156 | |
symantec_veritas | backup_exec | windows_servers_8.6 | |
symantec_veritas | backup_exec | windows_servers_9.0 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4367 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4367_sp1 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4454 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4454_sp1 | |
symantec_veritas | backup_exec | windows_servers_9.1 | |
symantec_veritas | backup_exec | windows_servers_9.1_rev._4691 | |
symantec_veritas | backup_exec | windows_servers_9.1_rev._4691_sp2 | |
symantec_veritas | backup_exec | windows_servers_10.0_rev._5484 | |
symantec_veritas | backup_exec | windows_servers_10.0_rev._5484_sp1 | |
symantec_veritas | backup_exec | windows_servers_10.0_rev._5520 | |
symantec_veritas | backup_exec_remote_agent | netware_server | |
symantec_veritas | backup_exec_remote_agent | unix_linux_server | |
symantec_veritas | backup_exec_remote_agent | windows_server | |
symantec_veritas | netbackup | netware_media_servers_4.5 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp1 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp2 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp3 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp4 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp5 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp6 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp7 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp8 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp1 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp2 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp3 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp4 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp5 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp6 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp7 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp8 | |
symantec_veritas | netbackup | netware_media_servers_5.0 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp1 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp2 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp3 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp4 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp5 | |
symantec_veritas | netbackup | netware_media_servers_5.1 | |
symantec_veritas | netbackup | netware_media_servers_5.1_mp1 | |
symantec_veritas | netbackup | netware_media_servers_5.1_mp2 | |
symantec_veritas | netbackup | netware_media_servers_5.1_mp3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4019:*:*:*:*:*:*:*", "matchCriteriaId": "C24230F6-26C4-4A09-BEB0-BF4E5B8A83F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4170:*:*:*:*:*:*:*", "matchCriteriaId": "A49730A7-4C5B-4130-A194-63BCB0C0DB62", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4172:*:*:*:*:*:*:*", "matchCriteriaId": "9247F741-16D7-40B3-9037-326270AE1A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4174:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD68D-E56E-4B95-AA70-CA2FC371AF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4202:*:*:*:*:*:*:*", "matchCriteriaId": "44B5CC50-7D43-493F-8DD5-56807CFFB56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.306:*:*:*:*:*:*:*", "matchCriteriaId": "2A59088D-B16C-4508-8594-4F9A66702914", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.307:*:*:*:*:*:*:*", "matchCriteriaId": "D6B20BEF-0D8F-412E-8AE3-9D660BF89C8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.2:*:*:*:*:*:*:*", "matchCriteriaId": "DA7C5BF9-5780-435D-9F42-5F2712A9C612", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.3:*:*:*:*:*:*:*", "matchCriteriaId": "17278449-4647-418C-A43F-980EDCE47E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1127_.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4EC8908-5A6E-4BE7-9AB6-A96E331392F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1151_.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BE7C8D6-CCFF-4C67-BD53-12519510A904", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152:*:*:*:*:*:*:*", "matchCriteriaId": "86CD25F2-2F58-4468-9898-15CE0701BBA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152_.4:*:*:*:*:*:*:*", "matchCriteriaId": "7BB00211-2397-4444-B8E2-FD05344FE05A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1154:*:*:*:*:*:*:*", "matchCriteriaId": "58ED7E29-8BFA-460F-B2C9-651DF9D31D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1156:*:*:*:*:*:*:*", "matchCriteriaId": "8DEFCF58-B287-4299-92FE-5077A52ADFA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_8.6:*:*:*:*:*:*:*", "matchCriteriaId": "C6375C88-EF6D-44E5-8445-788FB8B8DCDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C778849-F5FE-4C4D-BED3-B4E59D18E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367:*:*:*:*:*:*:*", "matchCriteriaId": "E034329F-003A-4A76-9146-8C3A216DEDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "724349E3-8152-4FF3-8617-6399B13B5332", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454:*:*:*:*:*:*:*", "matchCriteriaId": "66BA959E-A95D-4828-9FE5-7A5D82627A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "F02B3EF2-1327-4138-B8E1-BEFEAABC4066", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF573CC6-E3A5-49A0-9D64-C7D82EE87903", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691:*:*:*:*:*:*:*", "matchCriteriaId": "30AB7137-F41A-420F-9C01-FBB3E012CDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691_sp2:*:*:*:*:*:*:*", "matchCriteriaId": "1FDD5FDA-B5D4-4C93-A83E-3B7A1B89F02D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484:*:*:*:*:*:*:*", "matchCriteriaId": "11E65B29-5535-4818-ADF9-0E880AE152FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "EBBC7B82-58F9-4D75-B910-5287B7FA3720", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5520:*:*:*:*:*:*:*", "matchCriteriaId": "46AD7EE2-DA3A-4877-B29D-71650B255061", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server:*:*:*:*:*:*:*", "matchCriteriaId": "A4823F99-C0BA-43E1-AA7F-E35415D6C279", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server:*:*:*:*:*:*:*", "matchCriteriaId": "19977C9B-BD6C-45A4-AB33-31C7BB00782D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server:*:*:*:*:*:*:*", "matchCriteriaId": "CEE4468B-241C-4F20-BC43-5A24F187014A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5081924-EAEB-4BAC-A6A9-A23587654D6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp1:*:*:*:*:*:*:*", "matchCriteriaId": "7B4EC4ED-AD7A-4D07-B105-D8BC11267942", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp2:*:*:*:*:*:*:*", "matchCriteriaId": "7C8A41C7-1AB9-443D-BB23-F31144DFAFD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp3:*:*:*:*:*:*:*", "matchCriteriaId": "D0D5585D-CBC1-4209-A990-33DCE08BD10D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp4:*:*:*:*:*:*:*", "matchCriteriaId": "D927248C-CD93-4266-8018-06546BDE0F46", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp5:*:*:*:*:*:*:*", "matchCriteriaId": "5F4076FB-45BD-46B8-AAB7-B46EA7901C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp6:*:*:*:*:*:*:*", "matchCriteriaId": "E3593F48-41BF-44E2-B91C-BA2A895FB100", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp7:*:*:*:*:*:*:*", "matchCriteriaId": "616B1E3A-D14E-4C88-BA71-84C060A13A3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp8:*:*:*:*:*:*:*", "matchCriteriaId": "F3F86FDE-00EF-4166-B079-E0E69DD90A61", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "3F6CE835-E847-4ED5-A8BC-1F5B363D057F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "DF1CD6F4-BC8B-45DE-A978-1537E3A87689", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp3:*:*:*:*:*:*:*", "matchCriteriaId": "69CBF588-B9FB-463B-BEE2-AC6D841EE81D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp4:*:*:*:*:*:*:*", "matchCriteriaId": "F638B809-E7E7-49FD-8CFE-08595B287D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp5:*:*:*:*:*:*:*", "matchCriteriaId": "CBD1DB09-DCC8-43DA-A27F-5388716FF013", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp6:*:*:*:*:*:*:*", "matchCriteriaId": "242E0063-43B4-4ADD-AB51-E4491509F83B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp7:*:*:*:*:*:*:*", "matchCriteriaId": "951B5532-C019-4B80-94A8-61DE2D084589", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp8:*:*:*:*:*:*:*", "matchCriteriaId": "F658FB82-5BF8-437E-BABA-14FFCDE3332F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D5E1821-A0D8-42CC-B0EF-A4C7EAB6D173", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "F04483F1-F206-4693-870F-84FFA310F6DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "3D342EB5-8DA1-4573-9EA3-210C94A883E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp3:*:*:*:*:*:*:*", "matchCriteriaId": "56E9E8E6-E6B9-42E4-BF40-8CC402A7AF05", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp4:*:*:*:*:*:*:*", "matchCriteriaId": "15F114D1-1D7B-41C3-A735-6F60C7B41460", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp5:*:*:*:*:*:*:*", "matchCriteriaId": "D74B8A14-1CD5-49C1-AF30-AE37796C9030", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE510737-B5FD-4B10-8062-AB90A57F3958", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "AE1E8843-29A8-41EB-8689-C5E02791E8D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "CA48FEAB-AD82-4648-AC9E-B2C72AA27BAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp3:*:*:*:*:*:*:*", "matchCriteriaId": "BEB12220-726E-4B32-BEEF-63B2E450F4D7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server." } ], "id": "CVE-2005-2611", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-17T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16403" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1014662" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14551" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1014662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }