Vulnerabilites related to symantec_veritas - backup_exec_remote_agent
CVE-2005-2611 (GCVE-0-2005-2611)
Vulnerability from cvelistv5
Published
2005-08-17 04:00
Modified
2024-08-07 22:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA05-224A.html | third-party-advisory, x_refsource_CERT | |
http://www.securityfocus.com/bid/14551 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/16403 | third-party-advisory, x_refsource_SECUNIA | |
http://www.kb.cert.org/vuls/id/378957 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2005/1387 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21793 | vdb-entry, x_refsource_XF | |
http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1014662 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:30:01.838Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA05-224A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "name": "14551", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14551" }, { "name": "16403", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16403" }, { "name": "VU#378957", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "name": "ADV-2005-1387", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "name": "backupexec-ndmp-gain-access(21793)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "name": "1014662", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014662" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TA05-224A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "name": "14551", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14551" }, { "name": "16403", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16403" }, { "name": "VU#378957", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "name": "ADV-2005-1387", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "name": "backupexec-ndmp-gain-access(21793)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "name": "1014662", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014662" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2611", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA05-224A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "name": "14551", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14551" }, { "name": "16403", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16403" }, { "name": "VU#378957", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/378957" }, { "name": "ADV-2005-1387", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "name": "backupexec-ndmp-gain-access(21793)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "name": "1014662", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014662" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2611", "datePublished": "2005-08-17T04:00:00", "dateReserved": "2005-08-17T00:00:00", "dateUpdated": "2024-08-07T22:30:01.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-1297 (GCVE-0-2006-1297)
Vulnerability from cvelistv5
Published
2006-03-19 23:00
Modified
2024-08-07 17:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to "memory errors."
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1015784 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/597 | third-party-advisory, x_refsource_SREASON | |
http://www.symantec.com/avcenter/security/Content/2006.03.17a.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/17098 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25309 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2006/0995 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/428016/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/19242 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:03:28.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1015784", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015784" }, { "name": "597", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/597" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html" }, { "name": "17098", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17098" }, { "name": "backupexec-app-memory-dos(25309)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309" }, { "name": "ADV-2006-0995", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0995" }, { "name": "20060317 Symantec Security Advisory SYM06-004", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded" }, { "name": "19242", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19242" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1015784", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015784" }, { "name": "597", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/597" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html" }, { "name": "17098", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17098" }, { "name": "backupexec-app-memory-dos(25309)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309" }, { "name": "ADV-2006-0995", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0995" }, { "name": "20060317 Symantec Security Advisory SYM06-004", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded" }, { "name": "19242", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19242" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1015784", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015784" }, { "name": "597", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/597" }, { "name": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html" }, { "name": "17098", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17098" }, { "name": "backupexec-app-memory-dos(25309)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309" }, { "name": "ADV-2006-0995", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0995" }, { "name": "20060317 Symantec Security Advisory SYM06-004", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded" }, { "name": "19242", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19242" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1297", "datePublished": "2006-03-19T23:00:00", "dateReserved": "2006-03-19T00:00:00", "dateUpdated": "2024-08-07T17:03:28.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2005-08-17 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | netware_servers_9.0.4019 | |
symantec_veritas | backup_exec | netware_servers_9.0.4170 | |
symantec_veritas | backup_exec | netware_servers_9.0.4172 | |
symantec_veritas | backup_exec | netware_servers_9.0.4174 | |
symantec_veritas | backup_exec | netware_servers_9.0.4202 | |
symantec_veritas | backup_exec | netware_servers_9.1.306 | |
symantec_veritas | backup_exec | netware_servers_9.1.307 | |
symantec_veritas | backup_exec | netware_servers_9.1.1067_.2 | |
symantec_veritas | backup_exec | netware_servers_9.1.1067_.3 | |
symantec_veritas | backup_exec | netware_servers_9.1.1127_.1 | |
symantec_veritas | backup_exec | netware_servers_9.1.1151_.1 | |
symantec_veritas | backup_exec | netware_servers_9.1.1152 | |
symantec_veritas | backup_exec | netware_servers_9.1.1152_.4 | |
symantec_veritas | backup_exec | netware_servers_9.1.1154 | |
symantec_veritas | backup_exec | netware_servers_9.1.1156 | |
symantec_veritas | backup_exec | windows_servers_8.6 | |
symantec_veritas | backup_exec | windows_servers_9.0 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4367 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4367_sp1 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4454 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4454_sp1 | |
symantec_veritas | backup_exec | windows_servers_9.1 | |
symantec_veritas | backup_exec | windows_servers_9.1_rev._4691 | |
symantec_veritas | backup_exec | windows_servers_9.1_rev._4691_sp2 | |
symantec_veritas | backup_exec | windows_servers_10.0_rev._5484 | |
symantec_veritas | backup_exec | windows_servers_10.0_rev._5484_sp1 | |
symantec_veritas | backup_exec | windows_servers_10.0_rev._5520 | |
symantec_veritas | backup_exec_remote_agent | netware_server | |
symantec_veritas | backup_exec_remote_agent | unix_linux_server | |
symantec_veritas | backup_exec_remote_agent | windows_server | |
symantec_veritas | netbackup | netware_media_servers_4.5 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp1 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp2 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp3 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp4 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp5 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp6 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp7 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp8 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp1 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp2 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp3 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp4 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp5 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp6 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp7 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp8 | |
symantec_veritas | netbackup | netware_media_servers_5.0 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp1 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp2 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp3 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp4 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp5 | |
symantec_veritas | netbackup | netware_media_servers_5.1 | |
symantec_veritas | netbackup | netware_media_servers_5.1_mp1 | |
symantec_veritas | netbackup | netware_media_servers_5.1_mp2 | |
symantec_veritas | netbackup | netware_media_servers_5.1_mp3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4019:*:*:*:*:*:*:*", "matchCriteriaId": "C24230F6-26C4-4A09-BEB0-BF4E5B8A83F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4170:*:*:*:*:*:*:*", "matchCriteriaId": "A49730A7-4C5B-4130-A194-63BCB0C0DB62", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4172:*:*:*:*:*:*:*", "matchCriteriaId": "9247F741-16D7-40B3-9037-326270AE1A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4174:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD68D-E56E-4B95-AA70-CA2FC371AF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4202:*:*:*:*:*:*:*", "matchCriteriaId": "44B5CC50-7D43-493F-8DD5-56807CFFB56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.306:*:*:*:*:*:*:*", "matchCriteriaId": "2A59088D-B16C-4508-8594-4F9A66702914", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.307:*:*:*:*:*:*:*", "matchCriteriaId": "D6B20BEF-0D8F-412E-8AE3-9D660BF89C8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.2:*:*:*:*:*:*:*", "matchCriteriaId": "DA7C5BF9-5780-435D-9F42-5F2712A9C612", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.3:*:*:*:*:*:*:*", "matchCriteriaId": "17278449-4647-418C-A43F-980EDCE47E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1127_.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4EC8908-5A6E-4BE7-9AB6-A96E331392F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1151_.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BE7C8D6-CCFF-4C67-BD53-12519510A904", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152:*:*:*:*:*:*:*", "matchCriteriaId": "86CD25F2-2F58-4468-9898-15CE0701BBA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152_.4:*:*:*:*:*:*:*", "matchCriteriaId": "7BB00211-2397-4444-B8E2-FD05344FE05A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1154:*:*:*:*:*:*:*", "matchCriteriaId": "58ED7E29-8BFA-460F-B2C9-651DF9D31D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1156:*:*:*:*:*:*:*", "matchCriteriaId": "8DEFCF58-B287-4299-92FE-5077A52ADFA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_8.6:*:*:*:*:*:*:*", "matchCriteriaId": "C6375C88-EF6D-44E5-8445-788FB8B8DCDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C778849-F5FE-4C4D-BED3-B4E59D18E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367:*:*:*:*:*:*:*", "matchCriteriaId": "E034329F-003A-4A76-9146-8C3A216DEDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "724349E3-8152-4FF3-8617-6399B13B5332", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454:*:*:*:*:*:*:*", "matchCriteriaId": "66BA959E-A95D-4828-9FE5-7A5D82627A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "F02B3EF2-1327-4138-B8E1-BEFEAABC4066", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF573CC6-E3A5-49A0-9D64-C7D82EE87903", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691:*:*:*:*:*:*:*", "matchCriteriaId": "30AB7137-F41A-420F-9C01-FBB3E012CDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691_sp2:*:*:*:*:*:*:*", "matchCriteriaId": "1FDD5FDA-B5D4-4C93-A83E-3B7A1B89F02D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484:*:*:*:*:*:*:*", "matchCriteriaId": "11E65B29-5535-4818-ADF9-0E880AE152FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "EBBC7B82-58F9-4D75-B910-5287B7FA3720", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5520:*:*:*:*:*:*:*", "matchCriteriaId": "46AD7EE2-DA3A-4877-B29D-71650B255061", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server:*:*:*:*:*:*:*", "matchCriteriaId": "A4823F99-C0BA-43E1-AA7F-E35415D6C279", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server:*:*:*:*:*:*:*", "matchCriteriaId": "19977C9B-BD6C-45A4-AB33-31C7BB00782D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server:*:*:*:*:*:*:*", "matchCriteriaId": "CEE4468B-241C-4F20-BC43-5A24F187014A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5081924-EAEB-4BAC-A6A9-A23587654D6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp1:*:*:*:*:*:*:*", "matchCriteriaId": "7B4EC4ED-AD7A-4D07-B105-D8BC11267942", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp2:*:*:*:*:*:*:*", "matchCriteriaId": "7C8A41C7-1AB9-443D-BB23-F31144DFAFD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp3:*:*:*:*:*:*:*", "matchCriteriaId": "D0D5585D-CBC1-4209-A990-33DCE08BD10D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp4:*:*:*:*:*:*:*", "matchCriteriaId": "D927248C-CD93-4266-8018-06546BDE0F46", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp5:*:*:*:*:*:*:*", "matchCriteriaId": "5F4076FB-45BD-46B8-AAB7-B46EA7901C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp6:*:*:*:*:*:*:*", "matchCriteriaId": "E3593F48-41BF-44E2-B91C-BA2A895FB100", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp7:*:*:*:*:*:*:*", "matchCriteriaId": "616B1E3A-D14E-4C88-BA71-84C060A13A3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp8:*:*:*:*:*:*:*", "matchCriteriaId": "F3F86FDE-00EF-4166-B079-E0E69DD90A61", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "3F6CE835-E847-4ED5-A8BC-1F5B363D057F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "DF1CD6F4-BC8B-45DE-A978-1537E3A87689", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp3:*:*:*:*:*:*:*", "matchCriteriaId": "69CBF588-B9FB-463B-BEE2-AC6D841EE81D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp4:*:*:*:*:*:*:*", "matchCriteriaId": "F638B809-E7E7-49FD-8CFE-08595B287D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp5:*:*:*:*:*:*:*", "matchCriteriaId": "CBD1DB09-DCC8-43DA-A27F-5388716FF013", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp6:*:*:*:*:*:*:*", "matchCriteriaId": "242E0063-43B4-4ADD-AB51-E4491509F83B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp7:*:*:*:*:*:*:*", "matchCriteriaId": "951B5532-C019-4B80-94A8-61DE2D084589", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp8:*:*:*:*:*:*:*", "matchCriteriaId": "F658FB82-5BF8-437E-BABA-14FFCDE3332F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D5E1821-A0D8-42CC-B0EF-A4C7EAB6D173", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "F04483F1-F206-4693-870F-84FFA310F6DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "3D342EB5-8DA1-4573-9EA3-210C94A883E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp3:*:*:*:*:*:*:*", "matchCriteriaId": "56E9E8E6-E6B9-42E4-BF40-8CC402A7AF05", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp4:*:*:*:*:*:*:*", "matchCriteriaId": "15F114D1-1D7B-41C3-A735-6F60C7B41460", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp5:*:*:*:*:*:*:*", "matchCriteriaId": "D74B8A14-1CD5-49C1-AF30-AE37796C9030", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE510737-B5FD-4B10-8062-AB90A57F3958", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "AE1E8843-29A8-41EB-8689-C5E02791E8D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "CA48FEAB-AD82-4648-AC9E-B2C72AA27BAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp3:*:*:*:*:*:*:*", "matchCriteriaId": "BEB12220-726E-4B32-BEEF-63B2E450F4D7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server." } ], "id": "CVE-2005-2611", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-17T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16403" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1014662" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14551" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1014662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-03-19 23:02
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to "memory errors."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | netware_server_9.1 | |
symantec_veritas | backup_exec | netware_server_9.2 | |
symantec_veritas | backup_exec_remote_agent | netware_server_9.1 | |
symantec_veritas | backup_exec_remote_agent | netware_server_9.2 | |
symantec_veritas | backup_exec_remote_agent | unix_linux_server_10.1 | |
symantec_veritas | backup_exec_remote_agent | windows_server_9.1 | |
symantec_veritas | backup_exec_remote_agent | windows_server_10.0 | |
symantec_veritas | backup_exec_remote_agent | windows_server_10.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_server_9.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC0A3E26-7FE0-4780-A202-8CEF4F752DE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_server_9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0C4BEBA2-8AA0-48E4-BE26-532837813267", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server_9.1:*:*:*:*:*:*:*", "matchCriteriaId": "71E2448A-4501-487C-A194-8144F8A14E79", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server_9.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC86B153-9696-4373-9E30-F7793BB4F3BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server_10.1:*:*:*:*:*:*:*", "matchCriteriaId": "7836C087-7F95-4264-AAB6-706AA6E9AAE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E41CFAC-A992-435A-8DED-E49C2284AD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_10.0:*:*:*:*:*:*:*", "matchCriteriaId": "81B58325-B79E-4C91-9BF3-601D8CB17037", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_10.1:*:*:*:*:*:*:*", "matchCriteriaId": "FCA85325-2513-4C12-93A2-31EF7422A617", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\"" } ], "id": "CVE-2006-1297", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-03-19T23:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19242" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/597" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015784" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/17098" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0995" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }