Summary
This host is running VERITAS Backup Exec Remote Agent for Windows Servers and is prone to buffer overflow vulnerability.
Impact
Successful exploitation will allow attackers to overflow a buffer and execute arbitrary code on the system.
Impact Level: System/Application
Solution
Upgrade to Veritas Backup Exec Remote Agent 10.0 rev. 5520 for Windows Servers For updates refer to http://www.symantec.com/index.jsp
Insight
The flaw is due to insufficient input validation on CONNECT_CLIENT_AUTH requests. CONNECT_CLIENT_AUTH requests sent with an authentication method type '3' indicating Windows user credentials, and an overly long password argument can overflow the buffer and lead to arbitrary code execution.
Affected
Veritas Backup Exec Remote Agent versions 9.0 through 10.0 for Windows Servers
References
Severity
Classification
-
CVE CVE-2005-0773 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Attachmate Reflection FTP Client LIST Command Remote Heap Buffer Overflow Vulnerability
- BSPlayer Stack Overflow Vulnerability SRT
- DesignWorks Professional '.cct' File BOF Vulnerability
- Active Perl 'Perl_repeatcpy()' Function Buffer Overflow Vulnerability (Windows)
- Adobe InDesign 'INDD' File Handling Remote Buffer Overflow Vulnerability