Overview
Veritas NetBackup Administrative Assistant interface may allow users to execute arbitrary commands with elevated privileges.
Description
The Veritas NetBackup Administrative Assistant interface (bpjava-susvc) contains an input validation vulnerability. According to Veritas Alert 271727 : When the NetBackup Administrative Java GUI connects to a NetBackup server (either a master or media server) a process is started on the server called bpjava-susvc. A normal user with access to this server could send specially crafted commands to this process and have those commands executed with root authority.
|
Impact
If an attacker supplies a vulnerable NetBackup server with specially crafted commands, those commands may be executed with elevated (possibly root) privileges. |
Solution
Apply Patch
This issue will be fixed in Veritas NetBackup version 6. |
Workaround
# An example: "C:\\Program Files\\VERITAS\\java" SET INSTALL_PATH=C:\\Program Files\\VERITAS\\\\Java SET SERVER_HOST=master.min.veritas.com SET NBJAVA_CONNECT_OPTION=1 Partial sample of a UNIX /usr/openv/java/nbj.conf file:
#bcpyrght #*************************************************************************** #* $VRTScprght: Copyright 1993 - 2003 VERITAS Software Corporation, All Rights Reserved $ * #*************************************************************************** #ecpyrght BPJAVA_PORT=13722 VNETD_PORT=13724 NBJAVA_CONNECT_OPTION=1 |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported in Veritas Alert 271727.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | None |
Severity Metric: | 3.65 |
Date Public: | 2004-10-20 |
Date First Published: | 2005-01-18 |
Date Last Updated: | 2005-04-20 14:48 UTC |
Document Revision: | 55 |