CVE-2006-0991
CVSS7.1
发布时间 :2006-03-27 19:06:00
修订时间 :2011-03-07 21:31:32
NMCOP    

[原文]Buffer overflow in the NetBackup Sharepoint Services server daemon (bpspsserver) on NetBackup 6.0 for Windows allows remote attackers to execute arbitrary code via crafted "Request Service" packets to the vnetd service (TCP port 13724).


[CNNVD]VERITAS NetBackup多个远程缓冲区溢出漏洞(CNNVD-200603-425)

        在Windows版NetBackup 6.0的NetBackup Sharepoint Services server daemon (bpspsserver)中存在缓冲区溢出,远程攻击者可通过发往vnetd服务(TCP端口3724)的伪"Request Service"数据包执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.1 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:veritas:netbackup:6.0::server
cpe:/a:veritas:netbackup:6.0::enterprise_server
cpe:/a:veritas:netbackup:5.0::server
cpe:/a:veritas:netbackup:5.0::enterprise_server
cpe:/a:veritas:netbackup:4.5.0:mp:datacenter
cpe:/a:veritas:netbackup:4.5.0:fp:businessserver
cpe:/a:veritas:netbackup:5.1::enterprise_server
cpe:/a:veritas:netbackup:5.1::server
cpe:/a:veritas:netbackup:4.5.0:mp:businessserver
cpe:/a:veritas:netbackup:4.5.0:fp:datacenter

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0991
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0991
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-425
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/377441
(UNKNOWN)  CERT-VN  VU#377441
http://securityresponse.symantec.com/avcenter/security/Content/2006.03.27.html
(PATCH)  CONFIRM  http://securityresponse.symantec.com/avcenter/security/Content/2006.03.27.html
http://xforce.iss.net/xforce/xfdb/25473
(UNKNOWN)  XF  netbackup-vnetd-bo(25473)
http://www.vupen.com/english/advisories/2006/1124
(UNKNOWN)  VUPEN  ADV-2006-1124
http://www.tippingpoint.com/security/advisories/TSRT-06-01.html
(VENDOR_ADVISORY)  MISC  http://www.tippingpoint.com/security/advisories/TSRT-06-01.html
http://www.securityfocus.com/bid/17264
(UNKNOWN)  BID  17264
http://www.securityfocus.com/archive/1/archive/1/428979/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060327 TSRT-06-01: Symantec VERITAS NetBackup vnetd Buffer Overflow Vulnerability
http://seer.support.veritas.com/docs/281521.htm
(UNKNOWN)  CONFIRM  http://seer.support.veritas.com/docs/281521.htm
http://securitytracker.com/id?1015832
(UNKNOWN)  SECTRACK  1015832
http://secunia.com/advisories/19417
(UNKNOWN)  SECUNIA  19417

- 漏洞信息

VERITAS NetBackup多个远程缓冲区溢出漏洞
高危 缓冲区溢出
2006-03-27 00:00:00 2006-09-21 00:00:00
远程  
        在Windows版NetBackup 6.0的NetBackup Sharepoint Services server daemon (bpspsserver)中存在缓冲区溢出,远程攻击者可通过发往vnetd服务(TCP端口3724)的伪"Request Service"数据包执行任意代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,厂商发布了相关更新。

- 漏洞信息 (F45069)

TSRT-06-01.txt (PacketStormID:F45069)
2006-04-01 00:00:00
 
advisory,overflow
CVE-2006-0991
[点击下载]

The vnetd from Symantec VERITAS NetBackup is susceptible to a buffer overflow vulnerability.

TSRT-06-01: Symantec VERITAS NetBackup vnetd Buffer Overflow Vulnerability
http://www.tippingpoint.com/security/advisories/TSRT-06-01.html
March 27, 2006

-- CVE ID:
CVE-2006-0991

-- Affected Vendor:
Symantec VERITAS

-- Affected Products:
VERITAS NetBackup 6.0 Client
VERITAS NetBackup 6.0 Server

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since January 23, 2006 by Digital Vaccine protection
filter ID 4021. For further product information on the TippingPoint IPS:

    http://www.tippingpoint.com 

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable Symantec VERITAS NetBackup client and server installations.
Authentication is not required to exploit this vulnerability.

This specific flaw exists within specially crafted messages to the
vnetd service, listening on TCP port 13724 via opcode 6 (Request
Service).  An attacker can overrun two fixed size buffers, one on the
stack, and the other in the .data section of the executable.

In the main function of bpspsserver, a call to get_adaptable_string()
at 0x0040243A reads in a variable length string from the network in the
form of '[len][string]'. This string is then copied via a sprintf() at
0x00402458, and a swprintf() at 0x00402479 into two different fixed
sized buffers. The first buffer is on the stack and the second buffer
is a global variable.

-- Vendor Response:
Symantec engineers have addressed these issues in all currently
supported versions of NetBackup. Symantec engineers did additional
reviews and will continue on-going reviews of related file
functionality to further enhance the overall security of Veritas
NetBackup products and to eliminate any additional potential concerns.

Security updates are available for all supported products. Symantec
strongly recommends all customers immediately apply the latest
cumulative Security Pack updates or Maintenance Pack releases as
indicated for their supported product versions to protect against
threats of this nature.

http://support.veritas.com/docs/281521 

-- Disclosure Timeline:
2006.01.23 - Vulnerability reported to vendor
2006.01.23 - Digital Vaccine released to TippingPoint customers
2006.03.27 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by the TippingPoint Security Research

    

- 漏洞信息

24170
VERITAS NetBackup vnetd Multiple Remote Overflows
Remote / Network Access Input Manipulation
Loss of Integrity Patch / RCS
Exploit Commercial Vendor Verified, Vendor Verified, Coordinated Disclosure

- 漏洞描述

- 时间线

2006-03-27 Unknow
2006-04-14 2006-03-27

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Veritas has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站