8 results (0.004 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 2

01 Mar 2021 — An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands. Se detectó un problema en Veritas Backup Exec versiones anteriores a 21.2. • https://packetstorm.news/files/id/168506 • CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 1%CPEs: 1EXPL: 2

01 Mar 2021 — An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to... • https://packetstorm.news/files/id/168506 • CWE-287: Improper Authentication •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 2

01 Mar 2021 — An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of the... • https://packetstorm.news/files/id/168506 • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 67%CPEs: 3EXPL: 2

10 May 2017 — In Veritas Backup Exec 2014 before build 14.1.1187.1126, 15 before build 14.2.1180.3160, and 16 before FP1, there is a use-after-free vulnerability in multiple agents that can lead to a denial of service or remote code execution. An unauthenticated attacker can use this vulnerability to crash the agent or potentially take control of the agent process and then the system it is running on. En Veritas Backup Exec 2014 anteriores a la compilación 14.1.1187.1126, 15 anteriores a la compilación 14.2.1180.3160, y ... • https://packetstorm.news/files/id/143192 • CWE-416: Use After Free •

CVSS: 6.5EPSS: 1%CPEs: 5EXPL: 1

31 May 2011 — Symantec Backup Exec 11.0, 12.0, 12.5, 13.0, and 13.0 R2 does not validate identity information sent between the media server and the remote agent, which allows man-in-the-middle attackers to execute NDMP commands via unspecified vectors. Symantec Backup Exec v11.0, v12.0, v12.5, v13.0 y v13.0R2 no valida la información de identidad enviada entre el servidor media y el agente remoto, que permite a los atacantes de hombre-en-medio (man in the middle) para ejecutar comandos NDMP a través de de vectores no esp... • https://www.exploit-db.com/exploits/17517 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 43%CPEs: 88EXPL: 0

09 Dec 2009 — VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Fou... • http://marc.info/?l=bugtraq&m=126046186917330&w=2 • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 1%CPEs: 4EXPL: 0

09 Dec 2008 — Multiple unspecified vulnerabilities in the Backup Exec remote-agent logon process in Symantec Backup Exec for Windows Servers 11.0 (aka 11d) builds 6235 and 7170, 12.0 build 1364, and 12.5 build 2213 allow remote attackers to bypass authentication, and read or delete files, via unknown vectors. Múltiples vulnerabilidades sin especificar en el proceso de logon en Backup Exec remote-agent Symantec de Backup Exec para Servidores Windows v11.0 (también conocido como 11d) builds 6235 y 7170, v12.0 build 1364, y... • http://secunia.com/advisories/32810 • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 5%CPEs: 4EXPL: 0

09 Dec 2008 — Buffer overflow in the data management protocol in Symantec Backup Exec for Windows Servers 11.0 (aka 11d) builds 6235 and 7170, 12.0 build 1364, and 12.5 build 2213 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors. NOTE: this can be exploited by unauthenticated remote attackers by leveraging CVE-2008-5407. Desbordamiento de búfer en el protocolo de administración de datos en Symantec Backup Exec para Windows Servers 1... • http://secunia.com/advisories/32810 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •