search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Veritas Backup Exec registration request buffer overflow

Vulnerability Note VU#907729

Original Release Date: 2005-01-14 | Last Revised: 2006-05-01

Overview

Certain versions of Veritas Backup Exec 8.x and 9.x can be remotely exploited to allow execution of arbitrary code on affected servers.

Description

A buffer overflow exists in Veritas Backup Exec 8.x (prior to 8.60.3878 Hotfix 68), and 9.x (pritor to 9.1.4691 Hotfix 40). A stack-based buffer can be overwritten when certain registration requests containing overly long hostnames are sent to vulnerable servers.

Exploits for this vulnerability have been made available via public web sites. Active exploitation of this vulnerability has been reported.

Impact

A remote intruder may be able to crash affected systems or execute arbitrary code with the privileges of the running service which may include domain-wide administrative rights.

Solution

Please see the vendor documents with patch information to resolve this issue:

http://seer.support.veritas.com/docs/273419.htm
http://seer.support.veritas.com/docs/273420.htm
http://seer.support.veritas.com/docs/273422.htm
http://seer.support.veritas.com/docs/273850.htm

IV. Workarounds


Restrict network access to 6101/tcp on affected servers

Vendor Information

907729
 

Hitachi Affected

Updated:  February 16, 2005

Status

Affected

Vendor Statement

JP1/VERITAS Backup Exec is vulnerable to this issue.

For vendor information please see:
http://www.hitachi-support.com/security/vuls/HS05-002/index.html (Japanese)
http://www.hitachi-support.com/security_e/vuls_e/HS05-002_e/index-e.html (English)

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see http://www.hitachi-support.com/security_e/vuls_e/HS05-002_e/index-e.html:

Update: February 8, 2005

Vulnerability of Buffer Overflow in JP1/VERITAS Backup Exec
▪ Affected product

Corrective action
Product name
Platform
Last update

HS05-002-01
JP1/VERITAS Backup Exec,
VERITAS Backup Exec
Windows
February 8, 2005


▪ Problem description
On December 17, 2004, Veritas released their TechNote titled "Remote exploitation of a stack-based buffer overflow vulnerability in Backup Exec 8.6 and 9.x may allow the unauthorized execution of arbitrary code".
On backup servers of the above products, malicious remote users can exploit the vulnerability of buffer overflow and execute arbitrary code.

Revision history
• February 8, 2005: This page is released.
 
 
• Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures.  However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice.  When referencing information, please confirm that you are referencing the latest information.
• The Web pages include information about products that are developed by non-Hitachi software developers.  Vulnerability information about those products is based on the information provided or disclosed by those developers.  Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
• The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them.  Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
• The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

NEC Corporation Affected

Updated:  February 02, 2005

Status

Affected

Vendor Statement

* VERITAS Backup Exec 8.x and 9.x
      - is Vulnerable.
         
http://www.ace.comp.nec.co.jp/BackupExec/(only in Japanese)
      - For more detail.
         
http://www.veritas.com/jp/support/shared/technotes/J273419/J273419.htm

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

A Vendor Statement has also been registered here:

http://jvn.jp/cert/JVNVU%23907729/index.html

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Veritas SOFTWARE Affected

Updated:  January 14, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see the Veritas notices posted here:

http://seer.support.veritas.com/docs/273419.htm
http://seer.support.veritas.com/docs/273420.htm
http://seer.support.veritas.com/docs/273422.htm
http://seer.support.veritas.com/docs/273850.htm

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

iDefense has credited an anonymous contributor and Patrik Karlsson for discovering this vulnerability.

This document was written by Jeffrey S. Havrilla.

Other Information

CVE IDs: CVE-2004-1172
Severity Metric: 17.82
Date Public: 2004-12-15
Date First Published: 2005-01-14
Date Last Updated: 2006-05-01 19:50 UTC
Document Revision: 16

Sponsored by CISA.