Vulnerabilites related to symantec_veritas - backup_exec
CVE-2004-1172 (GCVE-0-2004-1172)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:39:01.126Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273419.htm"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
          },
          {
            "name": "11974",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11974"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273850.htm"
          },
          {
            "name": "VU#907729",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/907729"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273422.htm"
          },
          {
            "name": "13495",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13495/"
          },
          {
            "name": "netbackup-agent-browser-bo(18506)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273420.htm"
          },
          {
            "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=169"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273419.htm"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
        },
        {
          "name": "11974",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11974"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273850.htm"
        },
        {
          "name": "VU#907729",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/907729"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273422.htm"
        },
        {
          "name": "13495",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13495/"
        },
        {
          "name": "netbackup-agent-browser-bo(18506)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273420.htm"
        },
        {
          "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=169"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1172",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://seer.support.veritas.com/docs/273419.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273419.htm"
            },
            {
              "name": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php",
              "refsource": "MISC",
              "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
            },
            {
              "name": "11974",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11974"
            },
            {
              "name": "http://seer.support.veritas.com/docs/273850.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273850.htm"
            },
            {
              "name": "VU#907729",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/907729"
            },
            {
              "name": "http://seer.support.veritas.com/docs/273422.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273422.htm"
            },
            {
              "name": "13495",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13495/"
            },
            {
              "name": "netbackup-agent-browser-bo(18506)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
            },
            {
              "name": "http://seer.support.veritas.com/docs/273420.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273420.htm"
            },
            {
              "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=169"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1172",
    "datePublished": "2004-12-22T05:00:00",
    "dateReserved": "2004-12-13T00:00:00",
    "dateUpdated": "2024-08-08T00:39:01.126Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2051 (GCVE-0-2005-2051)
Vulnerability from cvelistv5
Published
2005-06-26 04:00
Modified
2024-08-07 22:15
Severity ?
CWE
  • n/a
Summary
Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code.
References
http://www.ciac.org/ciac/bulletins/p-232.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://www.securityfocus.com/bid/14025vdb-entry, x_refsource_BID
http://seer.support.veritas.com/docs/276606.htmx_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=111954711532252&w=2mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/15789third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:15:36.839Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "P-232",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
          },
          {
            "name": "14025",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14025"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276606.htm"
          },
          {
            "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "P-232",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
        },
        {
          "name": "14025",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14025"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276606.htm"
        },
        {
          "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2051",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "P-232",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
            },
            {
              "name": "14025",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14025"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276606.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276606.htm"
            },
            {
              "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2051",
    "datePublished": "2005-06-26T04:00:00",
    "dateReserved": "2005-06-26T00:00:00",
    "dateUpdated": "2024-08-07T22:15:36.839Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1297 (GCVE-0-2006-1297)
Vulnerability from cvelistv5
Published
2006-03-19 23:00
Modified
2024-08-07 17:03
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to "memory errors."
References
http://securitytracker.com/id?1015784vdb-entry, x_refsource_SECTRACK
http://securityreason.com/securityalert/597third-party-advisory, x_refsource_SREASON
http://www.symantec.com/avcenter/security/Content/2006.03.17a.htmlx_refsource_CONFIRM
http://www.securityfocus.com/bid/17098vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/25309vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/0995vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/428016/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/19242third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.956Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1015784",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015784"
          },
          {
            "name": "597",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/597"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
          },
          {
            "name": "17098",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17098"
          },
          {
            "name": "backupexec-app-memory-dos(25309)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
          },
          {
            "name": "ADV-2006-0995",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0995"
          },
          {
            "name": "20060317 Symantec Security Advisory SYM06-004",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
          },
          {
            "name": "19242",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19242"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1015784",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015784"
        },
        {
          "name": "597",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/597"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
        },
        {
          "name": "17098",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17098"
        },
        {
          "name": "backupexec-app-memory-dos(25309)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
        },
        {
          "name": "ADV-2006-0995",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0995"
        },
        {
          "name": "20060317 Symantec Security Advisory SYM06-004",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
        },
        {
          "name": "19242",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19242"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1297",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1015784",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015784"
            },
            {
              "name": "597",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/597"
            },
            {
              "name": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html",
              "refsource": "CONFIRM",
              "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
            },
            {
              "name": "17098",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17098"
            },
            {
              "name": "backupexec-app-memory-dos(25309)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
            },
            {
              "name": "ADV-2006-0995",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0995"
            },
            {
              "name": "20060317 Symantec Security Advisory SYM06-004",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
            },
            {
              "name": "19242",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19242"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1297",
    "datePublished": "2006-03-19T23:00:00",
    "dateReserved": "2006-03-19T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.956Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0771 (GCVE-0-2005-0771)
Vulnerability from cvelistv5
Published
2005-06-29 04:00
Modified
2024-08-07 21:28
Severity ?
CWE
  • n/a
Summary
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
References
http://securitytracker.com/id?1014273vdb-entry, x_refsource_SECTRACK
http://www.kb.cert.org/vuls/id/584505third-party-advisory, x_refsource_CERT-VN
http://www.idefense.com/application/poi/display?id=269&type=vulnerabilities&flashstatus=truethird-party-advisory, x_refsource_IDEFENSE
http://www.us-cert.gov/cas/techalerts/TA05-180A.htmlthird-party-advisory, x_refsource_CERT
http://secunia.com/advisories/15789third-party-advisory, x_refsource_SECUNIA
http://seer.support.veritas.com/docs/277429.htmx_refsource_CONFIRM
http://seer.support.veritas.com/docs/276605.htmx_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:28.202Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1014273",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014273"
          },
          {
            "name": "VU#584505",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/584505"
          },
          {
            "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
          },
          {
            "name": "TA05-180A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276605.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-15T16:39:34",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1014273",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014273"
        },
        {
          "name": "VU#584505",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/584505"
        },
        {
          "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
        },
        {
          "name": "TA05-180A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276605.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0771",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1014273",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014273"
            },
            {
              "name": "VU#584505",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/584505"
            },
            {
              "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
            },
            {
              "name": "TA05-180A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276605.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276605.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0771",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-03-18T00:00:00",
    "dateUpdated": "2024-08-07T21:28:28.202Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2079 (GCVE-0-2005-2079)
Vulnerability from cvelistv5
Published
2005-06-29 04:00
Modified
2024-08-07 22:15
Severity ?
CWE
  • n/a
Summary
Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code.
References
http://seer.support.veritas.com/docs/276607.htmx_refsource_CONFIRM
http://www.kb.cert.org/vuls/id/352625third-party-advisory, x_refsource_CERT-VN
http://seer.support.veritas.com/docs/277429.htmx_refsource_CONFIRM
http://www.us-cert.gov/cas/techalerts/TA05-180A.htmlthird-party-advisory, x_refsource_CERT
http://www.securityfocus.com/bid/14023vdb-entry, x_refsource_BID
http://secunia.com/advisories/15789third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:15:37.313Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276607.htm"
          },
          {
            "name": "VU#352625",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/352625"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "name": "TA05-180A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
          },
          {
            "name": "14023",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14023"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-31T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276607.htm"
        },
        {
          "name": "VU#352625",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/352625"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "name": "TA05-180A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
        },
        {
          "name": "14023",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14023"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2079",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://seer.support.veritas.com/docs/276607.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276607.htm"
            },
            {
              "name": "VU#352625",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/352625"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "TA05-180A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
            },
            {
              "name": "14023",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14023"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2079",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-06-29T00:00:00",
    "dateUpdated": "2024-08-07T22:15:37.313Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2611 (GCVE-0-2005-2611)
Vulnerability from cvelistv5
Published
2005-08-17 04:00
Modified
2024-08-07 22:30
Severity ?
CWE
  • n/a
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
References
http://www.us-cert.gov/cas/techalerts/TA05-224A.htmlthird-party-advisory, x_refsource_CERT
http://www.securityfocus.com/bid/14551vdb-entry, x_refsource_BID
http://secunia.com/advisories/16403third-party-advisory, x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/378957third-party-advisory, x_refsource_CERT-VN
http://www.vupen.com/english/advisories/2005/1387vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/21793vdb-entry, x_refsource_XF
http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.htmlx_refsource_CONFIRM
http://securitytracker.com/id?1014662vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.838Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "TA05-224A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
          },
          {
            "name": "14551",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14551"
          },
          {
            "name": "16403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16403"
          },
          {
            "name": "VU#378957",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/378957"
          },
          {
            "name": "ADV-2005-1387",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/1387"
          },
          {
            "name": "backupexec-ndmp-gain-access(21793)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
          },
          {
            "name": "1014662",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014662"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "TA05-224A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
        },
        {
          "name": "14551",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14551"
        },
        {
          "name": "16403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16403"
        },
        {
          "name": "VU#378957",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/378957"
        },
        {
          "name": "ADV-2005-1387",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/1387"
        },
        {
          "name": "backupexec-ndmp-gain-access(21793)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
        },
        {
          "name": "1014662",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014662"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2611",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "TA05-224A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
            },
            {
              "name": "14551",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14551"
            },
            {
              "name": "16403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16403"
            },
            {
              "name": "VU#378957",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/378957"
            },
            {
              "name": "ADV-2005-1387",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/1387"
            },
            {
              "name": "backupexec-ndmp-gain-access(21793)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
            },
            {
              "name": "1014662",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014662"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2611",
    "datePublished": "2005-08-17T04:00:00",
    "dateReserved": "2005-08-17T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.838Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1298 (GCVE-0-2006-1298)
Vulnerability from cvelistv5
Published
2006-03-19 23:00
Modified
2024-08-07 17:03
Severity ?
CWE
  • n/a
Summary
Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.944Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060320 Symantec Security Advisory, SYM06-005",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.veritas.com/docs/282254"
          },
          {
            "name": "ADV-2006-0996",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0996"
          },
          {
            "name": "1015785",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015785"
          },
          {
            "name": "19242",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19242"
          },
          {
            "name": "backupexec-bengine-format-string(25310)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
          },
          {
            "name": "17096",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17096"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060320 Symantec Security Advisory, SYM06-005",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.veritas.com/docs/282254"
        },
        {
          "name": "ADV-2006-0996",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0996"
        },
        {
          "name": "1015785",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015785"
        },
        {
          "name": "19242",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19242"
        },
        {
          "name": "backupexec-bengine-format-string(25310)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
        },
        {
          "name": "17096",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17096"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1298",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060320 Symantec Security Advisory, SYM06-005",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
            },
            {
              "name": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html",
              "refsource": "CONFIRM",
              "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
            },
            {
              "name": "http://support.veritas.com/docs/282254",
              "refsource": "CONFIRM",
              "url": "http://support.veritas.com/docs/282254"
            },
            {
              "name": "ADV-2006-0996",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0996"
            },
            {
              "name": "1015785",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015785"
            },
            {
              "name": "19242",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19242"
            },
            {
              "name": "backupexec-bengine-format-string(25310)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
            },
            {
              "name": "17096",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17096"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1298",
    "datePublished": "2006-03-19T23:00:00",
    "dateReserved": "2006-03-19T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.944Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4128 (GCVE-0-2006-4128)
Vulnerability from cvelistv5
Published
2006-08-14 23:00
Modified
2024-08-07 18:57
Severity ?
CWE
  • n/a
Summary
Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message.
References
http://securitytracker.com/id?1016683vdb-entry, x_refsource_SECTRACK
http://seer.entsupport.symantec.com/docs/284623.htmx_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/28336vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/443037/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/647796third-party-advisory, x_refsource_CERT-VN
http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.htmlx_refsource_CONFIRM
http://securityreason.com/securityalert/1380third-party-advisory, x_refsource_SREASON
http://www.vupen.com/english/advisories/2006/3266vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/19479vdb-entry, x_refsource_BID
http://secunia.com/advisories/21472third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:57:46.261Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1016683",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016683"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
          },
          {
            "name": "backupexec-rpc-interface-bo(28336)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
          },
          {
            "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
          },
          {
            "name": "VU#647796",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/647796"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
          },
          {
            "name": "1380",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1380"
          },
          {
            "name": "ADV-2006-3266",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3266"
          },
          {
            "name": "19479",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19479"
          },
          {
            "name": "21472",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21472"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1016683",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016683"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
        },
        {
          "name": "backupexec-rpc-interface-bo(28336)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
        },
        {
          "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
        },
        {
          "name": "VU#647796",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/647796"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
        },
        {
          "name": "1380",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1380"
        },
        {
          "name": "ADV-2006-3266",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3266"
        },
        {
          "name": "19479",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19479"
        },
        {
          "name": "21472",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21472"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4128",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1016683",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016683"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/284623.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
            },
            {
              "name": "backupexec-rpc-interface-bo(28336)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
            },
            {
              "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
            },
            {
              "name": "VU#647796",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/647796"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
            },
            {
              "name": "1380",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1380"
            },
            {
              "name": "ADV-2006-3266",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3266"
            },
            {
              "name": "19479",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19479"
            },
            {
              "name": "21472",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21472"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4128",
    "datePublished": "2006-08-14T23:00:00",
    "dateReserved": "2006-08-14T00:00:00",
    "dateUpdated": "2024-08-07T18:57:46.261Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1117 (GCVE-0-2002-1117)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:12
Severity ?
CWE
  • n/a
Summary
Veritas Backup Exec 8.5 and earlier requires that the "RestrictAnonymous" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:12:17.044Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020906 Veritas Backup Exec opens networks for NetBIOS based attacks?",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103134395124579\u0026w=2"
          },
          {
            "name": "oval:org.mitre.oval:def:1036",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036"
          },
          {
            "name": "8230",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/8230"
          },
          {
            "name": "20020906 UPDATE: (Was Veritas Backup Exec opens networks for NetBIOS based attacks?)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103134930629683\u0026w=2"
          },
          {
            "name": "veritas-backupexec-restrictanonymous-zero(10093)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10093"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/238618.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-09-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Veritas Backup Exec 8.5 and earlier requires that the \"RestrictAnonymous\" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-11-01T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020906 Veritas Backup Exec opens networks for NetBIOS based attacks?",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103134395124579\u0026w=2"
        },
        {
          "name": "oval:org.mitre.oval:def:1036",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036"
        },
        {
          "name": "8230",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/8230"
        },
        {
          "name": "20020906 UPDATE: (Was Veritas Backup Exec opens networks for NetBIOS based attacks?)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103134930629683\u0026w=2"
        },
        {
          "name": "veritas-backupexec-restrictanonymous-zero(10093)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10093"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/238618.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1117",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Veritas Backup Exec 8.5 and earlier requires that the \"RestrictAnonymous\" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020906 Veritas Backup Exec opens networks for NetBIOS based attacks?",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103134395124579\u0026w=2"
            },
            {
              "name": "oval:org.mitre.oval:def:1036",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036"
            },
            {
              "name": "8230",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/8230"
            },
            {
              "name": "20020906 UPDATE: (Was Veritas Backup Exec opens networks for NetBIOS based attacks?)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103134930629683\u0026w=2"
            },
            {
              "name": "veritas-backupexec-restrictanonymous-zero(10093)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10093"
            },
            {
              "name": "http://seer.support.veritas.com/docs/238618.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/238618.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1117",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2002-09-06T00:00:00",
    "dateUpdated": "2024-08-08T03:12:17.044Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0773 (GCVE-0-2005-0773)
Vulnerability from cvelistv5
Published
2005-06-29 04:00
Modified
2024-08-07 21:28
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.
References
http://www.kb.cert.org/vuls/id/492105third-party-advisory, x_refsource_CERT-VN
http://securitytracker.com/id?1014273vdb-entry, x_refsource_SECTRACK
http://www.osvdb.org/17624vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/14022vdb-entry, x_refsource_BID
http://seer.support.veritas.com/docs/277429.htmx_refsource_CONFIRM
http://seer.support.veritas.com/docs/276604.htmx_refsource_CONFIRM
http://www.idefense.com/application/poi/display?id=272&type=vulnerabilities&flashstatus=truethird-party-advisory, x_refsource_IDEFENSE
http://www.us-cert.gov/cas/techalerts/TA05-180A.htmlthird-party-advisory, x_refsource_CERT
http://secunia.com/advisories/15789third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:28.409Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#492105",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/492105"
          },
          {
            "name": "1014273",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014273"
          },
          {
            "name": "17624",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17624"
          },
          {
            "name": "14022",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14022"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276604.htm"
          },
          {
            "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
          },
          {
            "name": "TA05-180A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-14T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#492105",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/492105"
        },
        {
          "name": "1014273",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014273"
        },
        {
          "name": "17624",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17624"
        },
        {
          "name": "14022",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14022"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276604.htm"
        },
        {
          "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
        },
        {
          "name": "TA05-180A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0773",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#492105",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/492105"
            },
            {
              "name": "1014273",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014273"
            },
            {
              "name": "17624",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17624"
            },
            {
              "name": "14022",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14022"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276604.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276604.htm"
            },
            {
              "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
            },
            {
              "name": "TA05-180A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0773",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-03-18T00:00:00",
    "dateUpdated": "2024-08-07T21:28:28.409Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2080 (GCVE-0-2005-2080)
Vulnerability from cvelistv5
Published
2005-06-29 04:00
Modified
2024-08-07 22:15
Severity ?
CWE
  • n/a
Summary
Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server.
References
http://www.securityfocus.com/bid/14026vdb-entry, x_refsource_BID
http://seer.support.veritas.com/docs/277429.htmx_refsource_CONFIRM
http://seer.support.veritas.com/docs/276608.htmx_refsource_CONFIRM
http://secunia.com/advisories/15789third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:15:37.357Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "14026",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14026"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276608.htm"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-31T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "14026",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14026"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276608.htm"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2080",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "14026",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14026"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276608.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276608.htm"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2080",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-06-29T00:00:00",
    "dateUpdated": "2024-08-07T22:15:37.357Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2006-03-19 23:02
Modified
2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec.
Impacted products
Vendor Product Version
symantec_veritas backup_exec 9.1
symantec_veritas backup_exec 10.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:windows_servers:*:*:*:*:*",
              "matchCriteriaId": "BD6DC805-9CAB-4CA2-9F69-999F6832B7E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec."
    }
  ],
  "evaluatorSolution": "This vulnerability can only be exploited if the \u0027job log\u0027 mode is set to \"Full Detailed\" (aka Full Details).  Other older versions of Windows Server (those that have been End-Of-Life\u0027d) should be upgraded to the latest patch of one of the current versions listed above.",
  "id": "CVE-2006-1298",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-03-19T23:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19242"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015785"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://support.veritas.com/docs/282254"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/17096"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/0996"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19242"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015785"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://support.veritas.com/docs/282254"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/17096"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0996"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Veritas Backup Exec 8.5 and earlier requires that the "RestrictAnonymous" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares.
Impacted products
Vendor Product Version
symantec_veritas backup_exec *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15222C4-02DE-4433-BF16-947CC807B0F7",
              "versionEndIncluding": "8.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Veritas Backup Exec 8.5 and earlier requires that the \"RestrictAnonymous\" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares."
    }
  ],
  "id": "CVE-2002-1117",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-10-04T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=103134395124579\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=103134930629683\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seer.support.veritas.com/docs/238618.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/8230"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10093"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=103134395124579\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=103134930629683\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seer.support.veritas.com/docs/238618.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/8230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1036"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-06-23 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
Impacted products
Vendor Product Version
symantec_veritas backup_exec 9.0_rev.4367
symantec_veritas backup_exec 9.0_rev.4454
symantec_veritas backup_exec 9.1_rev.4691
symantec_veritas backup_exec 10.0_rev.5484



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*",
              "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106."
    }
  ],
  "id": "CVE-2005-0771",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-23T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014273"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276605.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/584505"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276605.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/584505"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-06-28 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "357967B9-D397-459B-A71A-FEBE0BCB8B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*",
              "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B94533F3-8954-4772-92A6-7E3EE29D3162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code."
    }
  ],
  "id": "CVE-2005-2051",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-28T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276606.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276606.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14025"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-06-29 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "357967B9-D397-459B-A71A-FEBE0BCB8B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D53EB23-4971-408E-A43F-009698C403A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4170:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F763B05-25F3-42B6-A90E-2454910B6AB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4172:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4609B0F-3F5C-464E-92B1-ED6AF3C4FB75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4174:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D899BF-F90C-43AD-8C17-CF59EE116BCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4202:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB1DD40C-E044-45D7-919E-6DC0749FEF0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.306:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1CD60F-847D-41D1-96C2-993E894F3EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.307:*:*:*:*:*:*:*",
              "matchCriteriaId": "376EA812-8D27-4321-96CC-36848FE8856D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "571BAEAC-E97D-4127-8C44-00206714587A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D17C351-CC27-4F3C-8024-0D7461534797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1127.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA711692-B9F2-4898-998D-7916C6572EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1151.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B4C81C-2706-461F-9516-A4CB055FE865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152:*:*:*:*:*:*:*",
              "matchCriteriaId": "183AE69A-BFCA-4AA4-AB08-18189AF7EE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2301AB87-1080-4C9E-81EC-91040AF882A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1154:*:*:*:*:*:*:*",
              "matchCriteriaId": "B312041E-57BE-48EF-B1FD-8F8B85D5AC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B94533F3-8954-4772-92A6-7E3EE29D3162",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server."
    }
  ],
  "id": "CVE-2005-2080",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-29T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276608.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14026"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276608.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14026"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code.
Impacted products
Vendor Product Version
symantec_veritas backup_exec 9.0_rev.4367
symantec_veritas backup_exec 9.0_rev.4454
symantec_veritas backup_exec 9.1_rev.4691
symantec_veritas backup_exec 10.0_rev.5484



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*",
              "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en Admin Plus Pack Option for VERITAS Backup Exec 9.0 hasta 10.0 para Windows Servers  permite que atacantes remotos ejecuten c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2005-2079",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276607.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/352625"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14023"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276607.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/352625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-08-14 23:04
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message.
References
cve@mitre.orghttp://secunia.com/advisories/21472Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/1380
cve@mitre.orghttp://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html
cve@mitre.orghttp://securitytracker.com/id?1016683
cve@mitre.orghttp://seer.entsupport.symantec.com/docs/284623.htmVendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/647796US Government Resource
cve@mitre.orghttp://www.securityfocus.com/archive/1/443037/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/19479
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3266
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28336
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21472Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/1380
af854a3a-2127-422b-91ae-364da2661108http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016683
af854a3a-2127-422b-91ae-364da2661108http://seer.entsupport.symantec.com/docs/284623.htmVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/647796US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/443037/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19479
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3266
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28336



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "E11FD33B-E9E1-4C1D-A3C2-622A99637B3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_build9.1.4691:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "0113460A-3653-471F-8CBC-DADDB8019424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.2:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "F0FE14BC-EC55-41D8-A3B2-01E5D713C537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "4D552062-F18D-4800-9618-C1A5F967F7C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_build10.0.5484:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "398B0C1C-3969-4664-A175-AF149DE701BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_build10.0.5520:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "CA98695D-2217-419A-8CEA-8EE30FEF6A95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "D1C409F7-A4AA-4693-AFB2-8DCA9E9AB928",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.325.6301:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDC7A0-1BDF-4BE6-ACC0-9508092A07C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.326.1401:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B46764B-6B34-414D-AD39-61A0C645F940",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.326.2501:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E7CF0C-3200-4976-B57B-91BDB8F50C47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.326.3301:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F47DBE4-186F-4064-8FEF-FA36050B2074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.327.401:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAC413A-B3BA-4AD4-9BD4-0BFC4355451E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1_build10.1.5629:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "5CAE4CB5-9716-4C34-A7F2-BA8133ECBA38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message."
    },
    {
      "lang": "es",
      "value": "M\u00faliples desbordamientos de b\u00fafer en Symantec VERITAS Backup Exec para Netware Server Remote Agent para Windows Server 9.1 y 9.2 (todas las construcciones), Backup Exec Continuous Protection Server Remote Agent para Windows Server 10.1 (10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, y 10.1.327.401), y Backup Exec para Windows Server y Remote Agent 9.1 (9.1.4691), 10.0 (10.0.5484 y 10.0.5520), y 10.1 (10.1.5629) permite a un atacante remoto provocar denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de mensajes RPC manipulados."
    }
  ],
  "id": "CVE-2006-4128",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-14T23:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21472"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1380"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016683"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/647796"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19479"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3266"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016683"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/647796"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-03-19 23:02
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to "memory errors."
Impacted products
Vendor Product Version
symantec_veritas backup_exec netware_server_9.1
symantec_veritas backup_exec netware_server_9.2
symantec_veritas backup_exec_remote_agent netware_server_9.1
symantec_veritas backup_exec_remote_agent netware_server_9.2
symantec_veritas backup_exec_remote_agent unix_linux_server_10.1
symantec_veritas backup_exec_remote_agent windows_server_9.1
symantec_veritas backup_exec_remote_agent windows_server_10.0
symantec_veritas backup_exec_remote_agent windows_server_10.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_server_9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0A3E26-7FE0-4780-A202-8CEF4F752DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_server_9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C4BEBA2-8AA0-48E4-BE26-532837813267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server_9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E2448A-4501-487C-A194-8144F8A14E79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server_9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC86B153-9696-4373-9E30-F7793BB4F3BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server_10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7836C087-7F95-4264-AAB6-706AA6E9AAE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E41CFAC-A992-435A-8DED-E49C2284AD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "81B58325-B79E-4C91-9BF3-601D8CB17037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCA85325-2513-4C12-93A2-31EF7422A617",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\""
    }
  ],
  "id": "CVE-2006-1297",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-03-19T23:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19242"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/597"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015784"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/17098"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/0995"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19242"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/597"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17098"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0995"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
References
cve@mitre.orghttp://secunia.com/advisories/13495/
cve@mitre.orghttp://seer.support.veritas.com/docs/273419.htm
cve@mitre.orghttp://seer.support.veritas.com/docs/273420.htm
cve@mitre.orghttp://seer.support.veritas.com/docs/273422.htm
cve@mitre.orghttp://seer.support.veritas.com/docs/273850.htm
cve@mitre.orghttp://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=169
cve@mitre.orghttp://www.kb.cert.org/vuls/id/907729US Government Resource
cve@mitre.orghttp://www.securityfocus.com/bid/11974Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18506
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13495/
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/273419.htm
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/273420.htm
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/273422.htm
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/273850.htm
af854a3a-2127-422b-91ae-364da2661108http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=169
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/907729US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11974Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18506



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D3D2DE8-D26F-4EB7-895F-F0764749395D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9359E8-65FF-4C46-8CB4-1E699EE767E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFDC7581-00EF-45FB-A50C-C1ED1EA7E247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "357967B9-D397-459B-A71A-FEBE0BCB8B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname."
    }
  ],
  "id": "CVE-2004-1172",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-01-10T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/13495/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seer.support.veritas.com/docs/273419.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seer.support.veritas.com/docs/273420.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seer.support.veritas.com/docs/273422.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seer.support.veritas.com/docs/273850.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.idefense.com/application/poi/display?id=169"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/907729"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11974"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/13495/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seer.support.veritas.com/docs/273419.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seer.support.veritas.com/docs/273420.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seer.support.veritas.com/docs/273422.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seer.support.veritas.com/docs/273850.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.idefense.com/application/poi/display?id=169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/907729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-06-18 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.
References
cve@mitre.orghttp://secunia.com/advisories/15789Patch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1014273Patch
cve@mitre.orghttp://seer.support.veritas.com/docs/276604.htmPatch, Vendor Advisory
cve@mitre.orghttp://seer.support.veritas.com/docs/277429.htmPatch
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=272&type=vulnerabilities&flashstatus=trueVendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/492105Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.osvdb.org/17624
cve@mitre.orghttp://www.securityfocus.com/bid/14022Exploit, Patch
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA05-180A.htmlPatch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/15789Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1014273Patch
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/276604.htmPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/277429.htmPatch
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=272&type=vulnerabilities&flashstatus=trueVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/492105Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/17624
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14022Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA05-180A.htmlPatch, Third Party Advisory, US Government Resource



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D53EB23-4971-408E-A43F-009698C403A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4170:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F763B05-25F3-42B6-A90E-2454910B6AB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4172:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4609B0F-3F5C-464E-92B1-ED6AF3C4FB75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4174:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D899BF-F90C-43AD-8C17-CF59EE116BCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4202:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB1DD40C-E044-45D7-919E-6DC0749FEF0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F669C0-D20D-49B1-A486-6DE6FF8A186F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*",
              "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B53EE99-ACFE-42FD-BA9A-379913E4D329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.306:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1CD60F-847D-41D1-96C2-993E894F3EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.307:*:*:*:*:*:*:*",
              "matchCriteriaId": "376EA812-8D27-4321-96CC-36848FE8856D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "571BAEAC-E97D-4127-8C44-00206714587A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D17C351-CC27-4F3C-8024-0D7461534797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1127.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA711692-B9F2-4898-998D-7916C6572EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1151.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B4C81C-2706-461F-9516-A4CB055FE865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152:*:*:*:*:*:*:*",
              "matchCriteriaId": "183AE69A-BFCA-4AA4-AB08-18189AF7EE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2301AB87-1080-4C9E-81EC-91040AF882A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1154:*:*:*:*:*:*:*",
              "matchCriteriaId": "B312041E-57BE-48EF-B1FD-8F8B85D5AC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691_sp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD59ED0-F1FD-42BD-9078-3A603FC4B899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52E569BF-72BD-49DE-8946-E575C677F06B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument."
    }
  ],
  "id": "CVE-2005-0773",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-18T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014273"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276604.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/492105"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/17624"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/14022"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276604.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/492105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/17624"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/14022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-17 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
References
cve@mitre.orghttp://secunia.com/advisories/16403Patch, Vendor Advisory
cve@mitre.orghttp://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.htmlPatch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1014662Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/378957Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.securityfocus.com/bid/14551Exploit
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA05-224A.htmlThird Party Advisory, US Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/1387
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/21793
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/16403Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1014662Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/378957Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14551Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA05-224A.htmlThird Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/1387
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/21793
Impacted products
Vendor Product Version
symantec_veritas backup_exec netware_servers_9.0.4019
symantec_veritas backup_exec netware_servers_9.0.4170
symantec_veritas backup_exec netware_servers_9.0.4172
symantec_veritas backup_exec netware_servers_9.0.4174
symantec_veritas backup_exec netware_servers_9.0.4202
symantec_veritas backup_exec netware_servers_9.1.306
symantec_veritas backup_exec netware_servers_9.1.307
symantec_veritas backup_exec netware_servers_9.1.1067_.2
symantec_veritas backup_exec netware_servers_9.1.1067_.3
symantec_veritas backup_exec netware_servers_9.1.1127_.1
symantec_veritas backup_exec netware_servers_9.1.1151_.1
symantec_veritas backup_exec netware_servers_9.1.1152
symantec_veritas backup_exec netware_servers_9.1.1152_.4
symantec_veritas backup_exec netware_servers_9.1.1154
symantec_veritas backup_exec netware_servers_9.1.1156
symantec_veritas backup_exec windows_servers_8.6
symantec_veritas backup_exec windows_servers_9.0
symantec_veritas backup_exec windows_servers_9.0_rev._4367
symantec_veritas backup_exec windows_servers_9.0_rev._4367_sp1
symantec_veritas backup_exec windows_servers_9.0_rev._4454
symantec_veritas backup_exec windows_servers_9.0_rev._4454_sp1
symantec_veritas backup_exec windows_servers_9.1
symantec_veritas backup_exec windows_servers_9.1_rev._4691
symantec_veritas backup_exec windows_servers_9.1_rev._4691_sp2
symantec_veritas backup_exec windows_servers_10.0_rev._5484
symantec_veritas backup_exec windows_servers_10.0_rev._5484_sp1
symantec_veritas backup_exec windows_servers_10.0_rev._5520
symantec_veritas backup_exec_remote_agent netware_server
symantec_veritas backup_exec_remote_agent unix_linux_server
symantec_veritas backup_exec_remote_agent windows_server
symantec_veritas netbackup netware_media_servers_4.5
symantec_veritas netbackup netware_media_servers_4.5_fp1
symantec_veritas netbackup netware_media_servers_4.5_fp2
symantec_veritas netbackup netware_media_servers_4.5_fp3
symantec_veritas netbackup netware_media_servers_4.5_fp4
symantec_veritas netbackup netware_media_servers_4.5_fp5
symantec_veritas netbackup netware_media_servers_4.5_fp6
symantec_veritas netbackup netware_media_servers_4.5_fp7
symantec_veritas netbackup netware_media_servers_4.5_fp8
symantec_veritas netbackup netware_media_servers_4.5_mp1
symantec_veritas netbackup netware_media_servers_4.5_mp2
symantec_veritas netbackup netware_media_servers_4.5_mp3
symantec_veritas netbackup netware_media_servers_4.5_mp4
symantec_veritas netbackup netware_media_servers_4.5_mp5
symantec_veritas netbackup netware_media_servers_4.5_mp6
symantec_veritas netbackup netware_media_servers_4.5_mp7
symantec_veritas netbackup netware_media_servers_4.5_mp8
symantec_veritas netbackup netware_media_servers_5.0
symantec_veritas netbackup netware_media_servers_5.0_mp1
symantec_veritas netbackup netware_media_servers_5.0_mp2
symantec_veritas netbackup netware_media_servers_5.0_mp3
symantec_veritas netbackup netware_media_servers_5.0_mp4
symantec_veritas netbackup netware_media_servers_5.0_mp5
symantec_veritas netbackup netware_media_servers_5.1
symantec_veritas netbackup netware_media_servers_5.1_mp1
symantec_veritas netbackup netware_media_servers_5.1_mp2
symantec_veritas netbackup netware_media_servers_5.1_mp3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4019:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24230F6-26C4-4A09-BEB0-BF4E5B8A83F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4170:*:*:*:*:*:*:*",
              "matchCriteriaId": "A49730A7-4C5B-4130-A194-63BCB0C0DB62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4172:*:*:*:*:*:*:*",
              "matchCriteriaId": "9247F741-16D7-40B3-9037-326270AE1A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4174:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEBFD68D-E56E-4B95-AA70-CA2FC371AF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4202:*:*:*:*:*:*:*",
              "matchCriteriaId": "44B5CC50-7D43-493F-8DD5-56807CFFB56C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.306:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A59088D-B16C-4508-8594-4F9A66702914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.307:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6B20BEF-0D8F-412E-8AE3-9D660BF89C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7C5BF9-5780-435D-9F42-5F2712A9C612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "17278449-4647-418C-A43F-980EDCE47E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1127_.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4EC8908-5A6E-4BE7-9AB6-A96E331392F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1151_.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BE7C8D6-CCFF-4C67-BD53-12519510A904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152:*:*:*:*:*:*:*",
              "matchCriteriaId": "86CD25F2-2F58-4468-9898-15CE0701BBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152_.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB00211-2397-4444-B8E2-FD05344FE05A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1154:*:*:*:*:*:*:*",
              "matchCriteriaId": "58ED7E29-8BFA-460F-B2C9-651DF9D31D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1156:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DEFCF58-B287-4299-92FE-5077A52ADFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6375C88-EF6D-44E5-8445-788FB8B8DCDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C778849-F5FE-4C4D-BED3-B4E59D18E5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367:*:*:*:*:*:*:*",
              "matchCriteriaId": "E034329F-003A-4A76-9146-8C3A216DEDD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "724349E3-8152-4FF3-8617-6399B13B5332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BA959E-A95D-4828-9FE5-7A5D82627A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F02B3EF2-1327-4138-B8E1-BEFEAABC4066",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF573CC6-E3A5-49A0-9D64-C7D82EE87903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691:*:*:*:*:*:*:*",
              "matchCriteriaId": "30AB7137-F41A-420F-9C01-FBB3E012CDFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691_sp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FDD5FDA-B5D4-4C93-A83E-3B7A1B89F02D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E65B29-5535-4818-ADF9-0E880AE152FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBBC7B82-58F9-4D75-B910-5287B7FA3720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5520:*:*:*:*:*:*:*",
              "matchCriteriaId": "46AD7EE2-DA3A-4877-B29D-71650B255061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4823F99-C0BA-43E1-AA7F-E35415D6C279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server:*:*:*:*:*:*:*",
              "matchCriteriaId": "19977C9B-BD6C-45A4-AB33-31C7BB00782D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE4468B-241C-4F20-BC43-5A24F187014A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5081924-EAEB-4BAC-A6A9-A23587654D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B4EC4ED-AD7A-4D07-B105-D8BC11267942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C8A41C7-1AB9-443D-BB23-F31144DFAFD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D5585D-CBC1-4209-A990-33DCE08BD10D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927248C-CD93-4266-8018-06546BDE0F46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F4076FB-45BD-46B8-AAB7-B46EA7901C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3593F48-41BF-44E2-B91C-BA2A895FB100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp7:*:*:*:*:*:*:*",
              "matchCriteriaId": "616B1E3A-D14E-4C88-BA71-84C060A13A3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F86FDE-00EF-4166-B079-E0E69DD90A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6CE835-E847-4ED5-A8BC-1F5B363D057F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1CD6F4-BC8B-45DE-A978-1537E3A87689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69CBF588-B9FB-463B-BEE2-AC6D841EE81D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F638B809-E7E7-49FD-8CFE-08595B287D83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD1DB09-DCC8-43DA-A27F-5388716FF013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp6:*:*:*:*:*:*:*",
              "matchCriteriaId": "242E0063-43B4-4ADD-AB51-E4491509F83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp7:*:*:*:*:*:*:*",
              "matchCriteriaId": "951B5532-C019-4B80-94A8-61DE2D084589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F658FB82-5BF8-437E-BABA-14FFCDE3332F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D5E1821-A0D8-42CC-B0EF-A4C7EAB6D173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04483F1-F206-4693-870F-84FFA310F6DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D342EB5-8DA1-4573-9EA3-210C94A883E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "56E9E8E6-E6B9-42E4-BF40-8CC402A7AF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F114D1-1D7B-41C3-A735-6F60C7B41460",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D74B8A14-1CD5-49C1-AF30-AE37796C9030",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE510737-B5FD-4B10-8062-AB90A57F3958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE1E8843-29A8-41EB-8689-C5E02791E8D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA48FEAB-AD82-4648-AC9E-B2C72AA27BAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB12220-726E-4B32-BEEF-63B2E450F4D7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
    }
  ],
  "id": "CVE-2005-2611",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-17T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16403"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1014662"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/378957"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/14551"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/1387"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1014662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/378957"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/14551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/1387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}