Vulnerabilites related to symantec_veritas - netbackup
CVE-2005-2611 (GCVE-0-2005-2611)
Vulnerability from cvelistv5
Published
2005-08-17 04:00
Modified
2024-08-07 22:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA05-224A.html | third-party-advisory, x_refsource_CERT | |
http://www.securityfocus.com/bid/14551 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/16403 | third-party-advisory, x_refsource_SECUNIA | |
http://www.kb.cert.org/vuls/id/378957 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2005/1387 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21793 | vdb-entry, x_refsource_XF | |
http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1014662 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:30:01.838Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA05-224A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "name": "14551", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14551" }, { "name": "16403", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16403" }, { "name": "VU#378957", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "name": "ADV-2005-1387", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "name": "backupexec-ndmp-gain-access(21793)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "name": "1014662", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014662" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TA05-224A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "name": "14551", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14551" }, { "name": "16403", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16403" }, { "name": "VU#378957", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "name": "ADV-2005-1387", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "name": "backupexec-ndmp-gain-access(21793)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "name": "1014662", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014662" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2611", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA05-224A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "name": "14551", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14551" }, { "name": "16403", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16403" }, { "name": "VU#378957", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/378957" }, { "name": "ADV-2005-1387", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "name": "backupexec-ndmp-gain-access(21793)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "name": "1014662", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014662" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2611", "datePublished": "2005-08-17T04:00:00", "dateReserved": "2005-08-17T00:00:00", "dateUpdated": "2024-08-07T22:30:01.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3116 (GCVE-0-2005-3116)
Vulnerability from cvelistv5
Published
2005-11-18 11:00
Modified
2024-08-07 23:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/574662 | third-party-advisory, x_refsource_CERT-VN | |
http://www.osvdb.org/20674 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/archive/1/422066/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/15353 | vdb-entry, x_refsource_BID | |
http://www.idefense.com/application/poi/display?id=336&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE | |
http://securitytracker.com/id?1015170 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/17503 | third-party-advisory, x_refsource_SECUNIA | |
http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/422157/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/22985 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2005/2349 | vdb-entry, x_refsource_VUPEN | |
http://seer.support.veritas.com/docs/279553.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:57.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#574662", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/574662" }, { "name": "20674", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20674" }, { "name": "20060115 Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded" }, { "name": "15353", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15353" }, { "name": "20051110 Stack Overflow in Veritas Netbackup Enterprise Server", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities" }, { "name": "1015170", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015170" }, { "name": "17503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17503" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html" }, { "name": "20060117 Re: Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded" }, { "name": "netbackup-vmd-bo(22985)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985" }, { "name": "ADV-2005-2349", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2349" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://seer.support.veritas.com/docs/279553.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#574662", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/574662" }, { "name": "20674", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20674" }, { "name": "20060115 Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded" }, { "name": "15353", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15353" }, { "name": "20051110 Stack Overflow in Veritas Netbackup Enterprise Server", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities" }, { "name": "1015170", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015170" }, { "name": "17503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17503" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html" }, { "name": "20060117 Re: Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded" }, { "name": "netbackup-vmd-bo(22985)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985" }, { "name": "ADV-2005-2349", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2349" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://seer.support.veritas.com/docs/279553.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#574662", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/574662" }, { "name": "20674", "refsource": "OSVDB", "url": "http://www.osvdb.org/20674" }, { "name": "20060115 Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded" }, { "name": "15353", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15353" }, { "name": "20051110 Stack Overflow in Veritas Netbackup Enterprise Server", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities" }, { "name": "1015170", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015170" }, { "name": "17503", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17503" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html" }, { "name": "20060117 Re: Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded" }, { "name": "netbackup-vmd-bo(22985)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985" }, { "name": "ADV-2005-2349", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2349" }, { "name": "http://seer.support.veritas.com/docs/279553.htm", "refsource": "CONFIRM", "url": "http://seer.support.veritas.com/docs/279553.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3116", "datePublished": "2005-11-18T11:00:00", "dateReserved": "2005-09-30T00:00:00", "dateUpdated": "2024-08-07T23:01:57.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2005-08-17 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | backup_exec | netware_servers_9.0.4019 | |
symantec_veritas | backup_exec | netware_servers_9.0.4170 | |
symantec_veritas | backup_exec | netware_servers_9.0.4172 | |
symantec_veritas | backup_exec | netware_servers_9.0.4174 | |
symantec_veritas | backup_exec | netware_servers_9.0.4202 | |
symantec_veritas | backup_exec | netware_servers_9.1.306 | |
symantec_veritas | backup_exec | netware_servers_9.1.307 | |
symantec_veritas | backup_exec | netware_servers_9.1.1067_.2 | |
symantec_veritas | backup_exec | netware_servers_9.1.1067_.3 | |
symantec_veritas | backup_exec | netware_servers_9.1.1127_.1 | |
symantec_veritas | backup_exec | netware_servers_9.1.1151_.1 | |
symantec_veritas | backup_exec | netware_servers_9.1.1152 | |
symantec_veritas | backup_exec | netware_servers_9.1.1152_.4 | |
symantec_veritas | backup_exec | netware_servers_9.1.1154 | |
symantec_veritas | backup_exec | netware_servers_9.1.1156 | |
symantec_veritas | backup_exec | windows_servers_8.6 | |
symantec_veritas | backup_exec | windows_servers_9.0 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4367 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4367_sp1 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4454 | |
symantec_veritas | backup_exec | windows_servers_9.0_rev._4454_sp1 | |
symantec_veritas | backup_exec | windows_servers_9.1 | |
symantec_veritas | backup_exec | windows_servers_9.1_rev._4691 | |
symantec_veritas | backup_exec | windows_servers_9.1_rev._4691_sp2 | |
symantec_veritas | backup_exec | windows_servers_10.0_rev._5484 | |
symantec_veritas | backup_exec | windows_servers_10.0_rev._5484_sp1 | |
symantec_veritas | backup_exec | windows_servers_10.0_rev._5520 | |
symantec_veritas | backup_exec_remote_agent | netware_server | |
symantec_veritas | backup_exec_remote_agent | unix_linux_server | |
symantec_veritas | backup_exec_remote_agent | windows_server | |
symantec_veritas | netbackup | netware_media_servers_4.5 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp1 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp2 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp3 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp4 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp5 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp6 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp7 | |
symantec_veritas | netbackup | netware_media_servers_4.5_fp8 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp1 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp2 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp3 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp4 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp5 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp6 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp7 | |
symantec_veritas | netbackup | netware_media_servers_4.5_mp8 | |
symantec_veritas | netbackup | netware_media_servers_5.0 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp1 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp2 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp3 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp4 | |
symantec_veritas | netbackup | netware_media_servers_5.0_mp5 | |
symantec_veritas | netbackup | netware_media_servers_5.1 | |
symantec_veritas | netbackup | netware_media_servers_5.1_mp1 | |
symantec_veritas | netbackup | netware_media_servers_5.1_mp2 | |
symantec_veritas | netbackup | netware_media_servers_5.1_mp3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4019:*:*:*:*:*:*:*", "matchCriteriaId": "C24230F6-26C4-4A09-BEB0-BF4E5B8A83F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4170:*:*:*:*:*:*:*", "matchCriteriaId": "A49730A7-4C5B-4130-A194-63BCB0C0DB62", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4172:*:*:*:*:*:*:*", "matchCriteriaId": "9247F741-16D7-40B3-9037-326270AE1A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4174:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD68D-E56E-4B95-AA70-CA2FC371AF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4202:*:*:*:*:*:*:*", "matchCriteriaId": "44B5CC50-7D43-493F-8DD5-56807CFFB56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.306:*:*:*:*:*:*:*", "matchCriteriaId": "2A59088D-B16C-4508-8594-4F9A66702914", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.307:*:*:*:*:*:*:*", "matchCriteriaId": "D6B20BEF-0D8F-412E-8AE3-9D660BF89C8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.2:*:*:*:*:*:*:*", "matchCriteriaId": "DA7C5BF9-5780-435D-9F42-5F2712A9C612", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.3:*:*:*:*:*:*:*", "matchCriteriaId": "17278449-4647-418C-A43F-980EDCE47E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1127_.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4EC8908-5A6E-4BE7-9AB6-A96E331392F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1151_.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BE7C8D6-CCFF-4C67-BD53-12519510A904", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152:*:*:*:*:*:*:*", "matchCriteriaId": "86CD25F2-2F58-4468-9898-15CE0701BBA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152_.4:*:*:*:*:*:*:*", "matchCriteriaId": "7BB00211-2397-4444-B8E2-FD05344FE05A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1154:*:*:*:*:*:*:*", "matchCriteriaId": "58ED7E29-8BFA-460F-B2C9-651DF9D31D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1156:*:*:*:*:*:*:*", "matchCriteriaId": "8DEFCF58-B287-4299-92FE-5077A52ADFA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_8.6:*:*:*:*:*:*:*", "matchCriteriaId": "C6375C88-EF6D-44E5-8445-788FB8B8DCDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C778849-F5FE-4C4D-BED3-B4E59D18E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367:*:*:*:*:*:*:*", "matchCriteriaId": "E034329F-003A-4A76-9146-8C3A216DEDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "724349E3-8152-4FF3-8617-6399B13B5332", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454:*:*:*:*:*:*:*", "matchCriteriaId": "66BA959E-A95D-4828-9FE5-7A5D82627A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "F02B3EF2-1327-4138-B8E1-BEFEAABC4066", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF573CC6-E3A5-49A0-9D64-C7D82EE87903", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691:*:*:*:*:*:*:*", "matchCriteriaId": "30AB7137-F41A-420F-9C01-FBB3E012CDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691_sp2:*:*:*:*:*:*:*", "matchCriteriaId": "1FDD5FDA-B5D4-4C93-A83E-3B7A1B89F02D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484:*:*:*:*:*:*:*", "matchCriteriaId": "11E65B29-5535-4818-ADF9-0E880AE152FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "EBBC7B82-58F9-4D75-B910-5287B7FA3720", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5520:*:*:*:*:*:*:*", "matchCriteriaId": "46AD7EE2-DA3A-4877-B29D-71650B255061", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server:*:*:*:*:*:*:*", "matchCriteriaId": "A4823F99-C0BA-43E1-AA7F-E35415D6C279", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server:*:*:*:*:*:*:*", "matchCriteriaId": "19977C9B-BD6C-45A4-AB33-31C7BB00782D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server:*:*:*:*:*:*:*", "matchCriteriaId": "CEE4468B-241C-4F20-BC43-5A24F187014A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5081924-EAEB-4BAC-A6A9-A23587654D6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp1:*:*:*:*:*:*:*", "matchCriteriaId": "7B4EC4ED-AD7A-4D07-B105-D8BC11267942", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp2:*:*:*:*:*:*:*", "matchCriteriaId": "7C8A41C7-1AB9-443D-BB23-F31144DFAFD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp3:*:*:*:*:*:*:*", "matchCriteriaId": "D0D5585D-CBC1-4209-A990-33DCE08BD10D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp4:*:*:*:*:*:*:*", "matchCriteriaId": "D927248C-CD93-4266-8018-06546BDE0F46", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp5:*:*:*:*:*:*:*", "matchCriteriaId": "5F4076FB-45BD-46B8-AAB7-B46EA7901C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp6:*:*:*:*:*:*:*", "matchCriteriaId": "E3593F48-41BF-44E2-B91C-BA2A895FB100", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp7:*:*:*:*:*:*:*", "matchCriteriaId": "616B1E3A-D14E-4C88-BA71-84C060A13A3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp8:*:*:*:*:*:*:*", "matchCriteriaId": "F3F86FDE-00EF-4166-B079-E0E69DD90A61", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "3F6CE835-E847-4ED5-A8BC-1F5B363D057F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "DF1CD6F4-BC8B-45DE-A978-1537E3A87689", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp3:*:*:*:*:*:*:*", "matchCriteriaId": "69CBF588-B9FB-463B-BEE2-AC6D841EE81D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp4:*:*:*:*:*:*:*", "matchCriteriaId": "F638B809-E7E7-49FD-8CFE-08595B287D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp5:*:*:*:*:*:*:*", "matchCriteriaId": "CBD1DB09-DCC8-43DA-A27F-5388716FF013", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp6:*:*:*:*:*:*:*", "matchCriteriaId": "242E0063-43B4-4ADD-AB51-E4491509F83B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp7:*:*:*:*:*:*:*", "matchCriteriaId": "951B5532-C019-4B80-94A8-61DE2D084589", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp8:*:*:*:*:*:*:*", "matchCriteriaId": "F658FB82-5BF8-437E-BABA-14FFCDE3332F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D5E1821-A0D8-42CC-B0EF-A4C7EAB6D173", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "F04483F1-F206-4693-870F-84FFA310F6DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "3D342EB5-8DA1-4573-9EA3-210C94A883E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp3:*:*:*:*:*:*:*", "matchCriteriaId": "56E9E8E6-E6B9-42E4-BF40-8CC402A7AF05", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp4:*:*:*:*:*:*:*", "matchCriteriaId": "15F114D1-1D7B-41C3-A735-6F60C7B41460", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp5:*:*:*:*:*:*:*", "matchCriteriaId": "D74B8A14-1CD5-49C1-AF30-AE37796C9030", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE510737-B5FD-4B10-8062-AB90A57F3958", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "AE1E8843-29A8-41EB-8689-C5E02791E8D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "CA48FEAB-AD82-4648-AC9E-B2C72AA27BAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp3:*:*:*:*:*:*:*", "matchCriteriaId": "BEB12220-726E-4B32-BEEF-63B2E450F4D7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server." } ], "id": "CVE-2005-2611", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-17T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16403" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1014662" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14551" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1014662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/378957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/1387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-11-18 06:03
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec_veritas | netbackup | 5.0_with_mp1 | |
symantec_veritas | netbackup | 5.0_with_mp2 | |
symantec_veritas | netbackup | 5.0_with_mp3 | |
symantec_veritas | netbackup | 5.0_with_mp4 | |
symantec_veritas | netbackup | 5.0_with_mp5 | |
symantec_veritas | netbackup | 5.1_with_mp1 | |
symantec_veritas | netbackup | 5.1_with_mp2 | |
symantec_veritas | netbackup | 5.1_with_mp3a | |
symantec_veritas | netbackup | 5.1_without_mp |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.0_with_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "54C2D4E7-E69F-4856-9A55-A0CE2E7A0EB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.0_with_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "4772C897-31EF-40D9-A06B-0069800E8555", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.0_with_mp3:*:*:*:*:*:*:*", "matchCriteriaId": "92FCDA77-5438-416C-AA74-2805236D6873", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.0_with_mp4:*:*:*:*:*:*:*", "matchCriteriaId": "8202F4F2-20D2-4F9C-AF48-4ECF3679C867", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.0_with_mp5:*:*:*:*:*:*:*", "matchCriteriaId": "79BA195E-9AB8-4735-9C98-6A4512C035F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.1_with_mp1:*:*:*:*:*:*:*", "matchCriteriaId": "F065C70A-EB65-4409-B237-D1B17C721DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.1_with_mp2:*:*:*:*:*:*:*", "matchCriteriaId": "90673C92-DDE7-43BB-BE1C-D9A0A3B52AEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.1_with_mp3a:*:*:*:*:*:*:*", "matchCriteriaId": "15966A96-F374-4CF0-ACE1-4D90DCDA0E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.1_without_mp:*:*:*:*:*:*:*", "matchCriteriaId": "C7CB7DE9-3089-4DC0-9BC4-BF9CFD345061", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet." } ], "evaluatorSolution": "Failed exploit attempts may result in a denial-of-service condition.", "id": "CVE-2005-3116", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-11-18T06:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17503" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015170" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/279553.htm" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/574662" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/20674" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15353" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2349" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://seer.support.veritas.com/docs/279553.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/574662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/20674" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }