Page 12 of 63 results (0.007 seconds)

CVSS: 10.0EPSS: 0%CPEs: 37EXPL: 0

The management-services protocol implementation in Veritas NetBackup 7.x through 7.5.0.7, 7.6.0.x through 7.6.0.4, 7.6.1.x through 7.6.1.2, and 7.7.x before 7.7.2 and NetBackup Appliance through 2.5.4, 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, and 2.7.x before 2.7.2 allows remote attackers to make arbitrary RPC calls via unspecified vectors. La implementación del protocolo management-services en Veritas NetBackup 7.x hasta la versión 7.5.0.7, 7.6.0.x hasta la versión 7.6.0.4, 7.6.1.x hasta la versión 7.6.1.2 y 7.7.x en versiones anteriores a 7.7.2 y NetBackup Appliance hasta la versión 2.5.4, 2.6.0.x hasta la versión 2.6.0.4, 2.6.1.x hasta la versión 2.6.1.2 y 2.7.x en versiones anteriores a 2.7.2 permite a atacantes remotos hacer llamadas RPC arbitrarias a través de vectores no especificados. • http://www.securitytracker.com/id/1035704 https://www.veritas.com/content/support/en_US/security/VTS16-001.html • CWE-284: Improper Access Control •

CVSS: 10.0EPSS: 0%CPEs: 37EXPL: 0

bpcd in Veritas NetBackup 7.x through 7.5.0.7, 7.6.0.x through 7.6.0.4, 7.6.1.x through 7.6.1.2, and 7.7.x before 7.7.2 and NetBackup Appliance through 2.5.4, 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary commands via crafted input. bpcd en Veritas NetBackup 7.x hasta la versión 7.5.0.7, 7.6.0.x hasta la versión 7.6.0.4, 7.6.1.x hasta la versión 7.6.1.2 y 7.7.x en versiones anteriores a 7.7.2 y NetBackup Appliance hasta la versión 2.5.4, 2.6.0.x hasta la versión 2.6.0.4, 2.6.1.x hasta la versión 2.6.1.2 y 2.7.x en versiones anteriores a 2.7.2 permite a atacantes remotos ejecutar comandos arbitrarios a través de la entrada manipulada. • http://www.securitytracker.com/id/1035704 https://www.veritas.com/content/support/en_US/security/VTS16-001.html • CWE-284: Improper Access Control •

CVSS: 5.9EPSS: 0%CPEs: 37EXPL: 0

Veritas NetBackup 7.x through 7.5.0.7 and 7.6.0.x through 7.6.0.4 and NetBackup Appliance through 2.5.4 and 2.6.0.x through 2.6.0.4 do not use TLS for administration-console traffic to the NBU server, which allows remote attackers to obtain sensitive information by sniffing the network for key-exchange packets. Veritas NetBackup 7.x hasta la versión 7.5.0.7 y 7.6.0.x hasta la versión 7.6.0.4 y NetBackup Appliance hasta la versión 2.5.4 y 2.6.0.x hasta la versión 2.6.0.4 no utilizan TLS para el tráfico de la consola de administración al servidor NBU, lo que permite a atacantes remotos obtener información sensible husmeando la red en busca de paquetes de intercambio de clave. • http://www.securitytracker.com/id/1035704 https://www.veritas.com/content/support/en_US/security/VTS16-001.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.1EPSS: 50%CPEs: 10EXPL: 0

Buffer overflow in the NetBackup Sharepoint Services server daemon (bpspsserver) on NetBackup 6.0 for Windows allows remote attackers to execute arbitrary code via crafted "Request Service" packets to the vnetd service (TCP port 13724). • http://secunia.com/advisories/19417 http://securityresponse.symantec.com/avcenter/security/Content/2006.03.27.html http://securitytracker.com/id?1015832 http://seer.support.veritas.com/docs/281521.htm http://www.kb.cert.org/vuls/id/377441 http://www.securityfocus.com/archive/1/428979/100/0/threaded http://www.securityfocus.com/bid/17264 http://www.tippingpoint.com/security/advisories/TSRT-06-01.html http://www.vupen.com/english/advisories/2006/1124 https://exchange.xforce. •

CVSS: 9.0EPSS: 91%CPEs: 10EXPL: 0

Stack-based buffer overflow in the volume manager daemon (vmd) in Veritas NetBackup Enterprise Server 5.0 through 6.0 and DataCenter and BusinesServer 4.5FP and 4.5MP allows attackers to execute arbitrary code via unknown vectors. This vulnerability allows remote attackers to execute arbitrary code on vulnerable Symantec VERITAS NetBackup installations. Authentication is not required to exploit this vulnerability. This specific flaw exists within the volume manager daemon (vmd.exe) due to incorrect bounds checking during a call to sscanf() that copies user-supplied data to a stack-based buffer. The vulnerable daemon listens on TCP port 13701. • http://securityreason.com/securityalert/639 http://securityresponse.symantec.com/avcenter/security/Content/2006.03.27.html http://securitytracker.com/id?1015832 http://seer.support.veritas.com/docs/281521.htm http://www.kb.cert.org/vuls/id/880801 http://www.osvdb.org/24172 http://www.securityfocus.com/archive/1/428944/100/0/threaded http://www.securityfocus.com/bid/17264 http://www.vupen.com/english/advisories/2006/1124 http://www.zerodayinitiative.com/advisories/ZDI-06-005 •