CVE-2005-3566 – Veritas Storage Foundation 4.0 - VCSI18N_LANG Local Overflow
https://notcve.org/view.php?id=CVE-2005-3566
Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew. • https://www.exploit-db.com/exploits/1316 http://marc.info/?l=bugtraq&m=113199516516880&w=2 http://osvdb.org/20673 http://secunia.com/advisories/17502 http://securityreason.com/securityalert/174 http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08a.html http://securitytracker.com/id?1015169 http://www.securityfocus.com/bid/15349 http://www.vupen.com/english/advisories/2005/2350 https://exchange.xforce.ibmcloud.com/vulnerabilities/22986 •
CVE-2005-3116 – Veritas NetBackup 4/5 - Volume Manager Daemon Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2005-3116
Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet. • https://www.exploit-db.com/exploits/1421 http://secunia.com/advisories/17503 http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html http://securitytracker.com/id?1015170 http://seer.support.veritas.com/docs/279553.htm http://www.idefense.com/application/poi/display?id=336&type=vulnerabilities http://www.kb.cert.org/vuls/id/574662 http://www.osvdb.org/20674 http://www.securityfocus.com/archive/1/422066/100/0/threaded http://www.securityfocus.com/archi •
CVE-2005-2715 – VERITAS NetBackup Remote Code Execution
https://notcve.org/view.php?id=CVE-2005-2715
Format string vulnerability in the Java user interface service (bpjava-msvc) daemon for VERITAS NetBackup Data and Business Center 4.5FP and 4.5MP, and NetBackup Enterprise/Server/Client 5.0, 5.1, and 6.0, allows remote attackers to execute arbitrary code via the COMMAND_LOGON_TO_MSERVER command. This vulnerability allows remote attackers to execute arbitrary code on vulnerable NetBackup installations. Authentication is not required to exploit this vulnerability. This specific flaw exists within the bpjava-msvc daemon due to incorrect handling of format string data passed through the 'COMMAND_LOGON_TO_MSERVER' command. The vulnerable daemon listens on TCP port 13722 and affects both NetBackup clients and servers. • https://www.exploit-db.com/exploits/1263 https://www.exploit-db.com/exploits/1265 https://www.exploit-db.com/exploits/1264 http://secunia.com/advisories/17181 http://securitytracker.com/id?1015028 http://seer.support.veritas.com/docs/279085.htm http://sunsolve.sun.com/search/document.do?assetkey=1-26-102054-1 http://www.kb.cert.org/vuls/id/495556 http://www.securityfocus.com/bid/15079 http://www.symantec.com/avcenter/security/Content/2005.10.12.html http:// •
CVE-2005-2996
https://notcve.org/view.php?id=CVE-2005-2996
Multiple heap-based and stack-based buffer overflows in certain DCOM server components in VERITAS Storage Exec Storage Exec 5.3 before Hotfix 9 and StorageCentral 5.2 before Hot Fix 2 allow remote attackers to execute arbitrary code via certain ActiveX controls. • http://secunia.com/advisories/16871 http://securityresponse.symantec.com/avcenter/security/Content/2005.09.19.html http://www.kb.cert.org/vuls/id/620497 http://www.kb.cert.org/vuls/id/927793 •
CVE-2005-2611 – Veritas Backup Exec (Windows) - Remote File Access
https://notcve.org/view.php?id=CVE-2005-2611
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server. • https://www.exploit-db.com/exploits/1147 http://secunia.com/advisories/16403 http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html http://securitytracker.com/id?1014662 http://www.kb.cert.org/vuls/id/378957 http://www.securityfocus.com/bid/14551 http://www.us-cert.gov/cas/techalerts/TA05-224A.html http://www.vupen.com/english/advisories/2005/1387 https://exchange.xforce.ibmcloud.com/vulnerabilities/21793 https://web.archive.org/web/20120227144337/http& •