CVE-2005-0771
CVSS10.0
发布时间 :2005-06-23 00:00:00
修订时间 :2011-03-07 21:20:33
NMCOPS    

[原文]VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.


[CNNVD]Veritas Backup Exec Server远程访问漏洞(CNNVD-200506-209)

        Windows操作系统下的VERITAS Backup Exec Server (beserver.exe) 9.0至10.0版本中,远程非认证攻击者可通过对TCP 6106端口上的PRC(远程过程调用)接口的方法调用来修改注册表。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:symantec_veritas:backup_exec:9.1_rev.4691
cpe:/a:symantec_veritas:backup_exec:9.0_rev.4454
cpe:/a:symantec_veritas:backup_exec:10.0_rev.5484
cpe:/a:symantec_veritas:backup_exec:9.0_rev.4367

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0771
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0771
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200506-209
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA05-180A.html
(VENDOR_ADVISORY)  CERT  TA05-180A
http://www.kb.cert.org/vuls/id/584505
(VENDOR_ADVISORY)  CERT-VN  VU#584505
http://seer.support.veritas.com/docs/277429.htm
(PATCH)  CONFIRM  http://seer.support.veritas.com/docs/277429.htm
http://seer.support.veritas.com/docs/276605.htm
(VENDOR_ADVISORY)  CONFIRM  http://seer.support.veritas.com/docs/276605.htm
http://securitytracker.com/id?1014273
(PATCH)  SECTRACK  1014273
http://secunia.com/advisories/15789
(VENDOR_ADVISORY)  SECUNIA  15789
http://www.idefense.com/application/poi/display?id=269&type=vulnerabilities&flashstatus=true
(UNKNOWN)  IDEFENSE  20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability

- 漏洞信息

Veritas Backup Exec Server远程访问漏洞
危急 访问验证错误
2005-06-23 00:00:00 2006-03-27 00:00:00
远程  
        Windows操作系统下的VERITAS Backup Exec Server (beserver.exe) 9.0至10.0版本中,远程非认证攻击者可通过对TCP 6106端口上的PRC(远程过程调用)接口的方法调用来修改注册表。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Windows Servers 10.0修订版下的Veritas Software Backup Exec5484
        Veritas VERITAS Backup Exec 10.0 rev. 5484 for Windows Servers - upgrade to Backup Exec 10.0 rev. 5520
        http://support.veritas.com/docs/277181
        Veritas VERITAS Backup Exec 10.0 rev. 5484 for Windows Servers Hotfix 24
        http://support.veritas.com/docs/275514
        Veritas Software Backup Exec for Windows Servers 9.0 rev. 4367
        Veritas VERITAS Backup Exec 9.0 rev. 4367 for Windows Servers Hotfix 21
        http://support.veritas.com/docs/276156
        Veritas Software Backup Exec for Windows Servers 9.0 rev. 4454
        Veritas VERITAS Backup Exec 9.0 rev. 4454 for Windows Servers Hotfix 31
        http://support.veritas.com/docs/275911
        Veritas Software Backup Exec for Windows Servers 9.1 rev. 4691
        Veritas VERITAS Backup Exec 9.1 rev. 4691 for Windows Servers Hotfix 52
        http://support.veritas.com/docs/275909

- 漏洞信息 (F38270)

iDEFENSE Security Advisory 2005-06-23.4 (PacketStormID:F38270)
2005-06-24 00:00:00
iDefense Labs  idefense.com
advisory,remote,registry
windows
CVE-2005-0771
[点击下载]

iDEFENSE Security Advisory 06.23.05-4 - Remote exploitation of an access validation vulnerability in Veritas Backup Exec for Windows provides attackers with 'Administrator' privileges over the target system's registry.

Veritas Backup Exec Server Remote Registry Access Vulnerability

iDEFENSE Security Advisory 06.23.05
www.idefense.com/application/poi/display?id=269&type=vulnerabilities
June 23, 2005

I. BACKGROUND

VERITAS Backup Exec is an advanced backup and restore solution for 
Microsoft Windows server environments. More information is available 
from the vendor's web site:

    http://veritas.com/Products/www?c=product&refId=57

II. DESCRIPTION

Remote exploitation of an access validation vulnerability in Veritas
Backup Exec for Windows provides attackers with 'Administrator'
privileges over the target system's registry.

The problem specifically exists within some RPC handlers defined in
beserver.exe. The Backup Exec Server service registers an RPC interface
on a TCP endpoint with ID 93841fd0-16ce-11ce-850d-02608c44967b on port
6106. The following assembly snippet from beserver.exe version
10.0.5484.0 shows the server-side RPC dispatch table for this interface:

    rpc_dispatch_table_1
        .text:00425E28 dd offset rpc_sub_1
        .text:00425E2C dd offset rpc_sub_2
        .text:00425E30 dd offset rpc_sub_3
        .text:00425E34 dd offset rpc_sub_4
        .text:00425E38 dd offset rpc_sub_5  ; registry read
        .text:00425E3C dd offset rpc_sub_6  ; registry write
        .text:00425E40 dd offset rpc_sub_7  ; registry delete
        .text:00425E44 dd offset rpc_sub_8  ; registry enum
        .text:00425E48 dd offset rpc_sub_9
        .text:00425E4C dd offset rpc_sub_10
        .text:00425E50 dd offset rpc_sub_11
        .text:00425E54 dd offset null_sub
        .text:00425E58 dd offset null_sub

The above marked routines allow unauthenticated remote attackers to
connect to the RPC endpoint and arbitrarily create, modify, delete and
read keys. An attacker needs only to reverse engineer the Microsoft
Interface Description Language (IDL) for the target routine and create
a custom client to connect to and manipulate the server. The IDL
definition for rpc_sub_6 is:

    long rpc_sub_6 (
        /* 04 */ [in] [string] wchar_t *sub_key,
        /* 08 */ [in] [string] wchar_t *value_name,
        /* 0C */ [in] long type,
        /* 10 */ [in] long len_data,
        /* 14 */ [in,out] [size_is(len_data)] byte *data,
        /* 18 */ [in] long len_hkey,
        /* 1C */ [in] [size_is(len_hkey)] byte *hkey
    );

III. ANALYSIS

Successful exploitation of the described vulnerability allows
unauthenticated remote attackers to connect to and arbitrarily modify
the target systems registry under the privileges of the 'Administrator'
user. Registry write access can be leveraged in a number of ways to
further compromise the target system. A simple vector would involve
writing values to startup keys with UNC paths to malicious binaries.

IV. DETECTION

iDEFENSE has confirmed the existence of this vulnerability in the
latest version of Veritas Backup Exec Server for Windows at the time of
writing, version 10. It is suspected that earlier versions are also
vulnerable.

V. WORKAROUND

Filter inbound TCP traffic on port 6106 to only trusted clients.

VI. VENDOR RESPONSE

The vendor has addressed this vulnerability in security advisory
VX05-003:

   http://seer.support.veritas.com/docs/276605.htm

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-0771 to this issue. This is a candidate for inclusion
in the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

03/18/2005      Initial vendor notification
03/30/2005      Initial vendor response
06/22/2005      Coordinated public disclosure

IX. CREDIT

This vulnerability was discovered by Pedram Amini, iDEFENSE Labs.

Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp

X. LEGAL NOTICES

Copyright (c) 2005 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.

There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息

17627
VERITAS Backup Exec Server Unauthenticated Remote Registry Access
Remote / Network Access Authentication Management
Loss of Integrity
Vendor Verified

- 漏洞描述

VERITAS Backup Exec Server (beserver.exe) contains a flaw that may allow a remote attacker to modify the Windows registry with administrative level permissions. The issue is due to RPC calls not properly authenticating callers of methods on TCP port 6106. This may allow an attacker to modify the registry of a host leading to a completely compromise.

- 时间线

2005-06-22 Unknow
Unknow 2005-06-22

- 解决方案

The vendor has made a hotfix available for each affected version. VERITAS Backup Exec 9.0 rev. 4367 for Windows Servers: Hotfix 21 VERITAS Backup Exec 9.0 rev. 4454 for Windows Servers: Hotfix 31 VERITAS Backup Exec 9.1 rev. 4691 for Windows Servers: Service Pack 4 VERITAS Backup Exec 10.0 rev. 5484 for Windows Servers: Hotfix 24 or upgrade to Backup Exec 10.0 rev. 5520 If a hotfix cannot be applied, please place access controls on traffic destine to TCP port 6106.

- 相关参考

- 漏洞作者

- 漏洞信息

Veritas Backup Exec Server Remote Registry Access Vulnerability
Access Validation Error 14020
Yes No
2005-06-22 12:00:00 2009-07-12 04:06:00
Discovery of this issue is credited to Pedram Amini, iDEFENSE Labs.

- 受影响的程序版本

Veritas Software Backup Exec for Windows Servers 10.0 rev. 5484
Veritas Software Backup Exec for Windows Servers 9.1 rev. 4691
Veritas Software Backup Exec for Windows Servers 9.0 rev. 4454
Veritas Software Backup Exec for Windows Servers 9.0 rev. 4367
Veritas Software Backup Exec for Windows Servers 10.0 rev. 5520

- 不受影响的程序版本

Veritas Software Backup Exec for Windows Servers 10.0 rev. 5520

- 漏洞讨论

VERITAS Backup Exec for Windows Servers is prone to an access validation vulnerability.

The issue may be leveraged by a remote attacker to gain 'Administrator' access to the vulnerable computer's registry. This access may be further leveraged to gain unfettered access to the target computer.

- 漏洞利用

An exploit (backupexec_registry.pm) as part of the Metasploit Framework has been released.

- 解决方案

The vendor has released an advisory (VX05-003) and fixes to address this issue:


Veritas Software Backup Exec for Windows Servers 10.0 rev. 5484

Veritas Software Backup Exec for Windows Servers 9.0 rev. 4367

Veritas Software Backup Exec for Windows Servers 9.0 rev. 4454

Veritas Software Backup Exec for Windows Servers 9.1 rev. 4691

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站