发布时间 :2006-03-27 19:06:00
修订时间 :2017-07-19 21:30:13

[原文]Buffer overflow in the NetBackup Sharepoint Services server daemon (bpspsserver) on NetBackup 6.0 for Windows allows remote attackers to execute arbitrary code via crafted "Request Service" packets to the vnetd service (TCP port 13724).

[CNNVD]VERITAS NetBackup多个远程缓冲区溢出漏洞(CNNVD-200603-425)

        在Windows版NetBackup 6.0的NetBackup Sharepoint Services server daemon (bpspsserver)中存在缓冲区溢出,远程攻击者可通过发往vnetd服务(TCP端口3724)的伪"Request Service"数据包执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.1 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20060327 TSRT-06-01: Symantec VERITAS NetBackup vnetd Buffer Overflow Vulnerability
(UNKNOWN)  BID  17264
(UNKNOWN)  VUPEN  ADV-2006-1124
(UNKNOWN)  XF  netbackup-vnetd-bo(25473)

- 漏洞信息

VERITAS NetBackup多个远程缓冲区溢出漏洞
高危 缓冲区溢出
2006-03-27 00:00:00 2006-09-21 00:00:00
        在Windows版NetBackup 6.0的NetBackup Sharepoint Services server daemon (bpspsserver)中存在缓冲区溢出,远程攻击者可通过发往vnetd服务(TCP端口3724)的伪"Request Service"数据包执行任意代码。

- 公告与补丁


- 漏洞信息 (F45069)

TSRT-06-01.txt (PacketStormID:F45069)
2006-04-01 00:00:00

The vnetd from Symantec VERITAS NetBackup is susceptible to a buffer overflow vulnerability.

TSRT-06-01: Symantec VERITAS NetBackup vnetd Buffer Overflow Vulnerability
March 27, 2006

-- CVE ID:

-- Affected Vendor:
Symantec VERITAS

-- Affected Products:
VERITAS NetBackup 6.0 Client
VERITAS NetBackup 6.0 Server

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since January 23, 2006 by Digital Vaccine protection
filter ID 4021. For further product information on the TippingPoint IPS: 

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable Symantec VERITAS NetBackup client and server installations.
Authentication is not required to exploit this vulnerability.

This specific flaw exists within specially crafted messages to the
vnetd service, listening on TCP port 13724 via opcode 6 (Request
Service).  An attacker can overrun two fixed size buffers, one on the
stack, and the other in the .data section of the executable.

In the main function of bpspsserver, a call to get_adaptable_string()
at 0x0040243A reads in a variable length string from the network in the
form of '[len][string]'. This string is then copied via a sprintf() at
0x00402458, and a swprintf() at 0x00402479 into two different fixed
sized buffers. The first buffer is on the stack and the second buffer
is a global variable.

-- Vendor Response:
Symantec engineers have addressed these issues in all currently
supported versions of NetBackup. Symantec engineers did additional
reviews and will continue on-going reviews of related file
functionality to further enhance the overall security of Veritas
NetBackup products and to eliminate any additional potential concerns.

Security updates are available for all supported products. Symantec
strongly recommends all customers immediately apply the latest
cumulative Security Pack updates or Maintenance Pack releases as
indicated for their supported product versions to protect against
threats of this nature. 

-- Disclosure Timeline:
2006.01.23 - Vulnerability reported to vendor
2006.01.23 - Digital Vaccine released to TippingPoint customers
2006.03.27 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by the TippingPoint Security Research


- 漏洞信息

VERITAS NetBackup vnetd Multiple Remote Overflows
Remote / Network Access Input Manipulation
Loss of Integrity Patch / RCS
Exploit Commercial Vendor Verified, Vendor Verified, Coordinated Disclosure

- 漏洞描述

- 时间线

2006-03-27 Unknow
2006-04-14 2006-03-27

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Veritas has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete