10 results (0.003 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 2

01 Mar 2021 — An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands. Se detectó un problema en Veritas Backup Exec versiones anteriores a 21.2. • https://packetstorm.news/files/id/168506 • CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 1%CPEs: 1EXPL: 2

01 Mar 2021 — An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to... • https://packetstorm.news/files/id/168506 • CWE-287: Improper Authentication •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 2

01 Mar 2021 — An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of the... • https://packetstorm.news/files/id/168506 • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 67%CPEs: 3EXPL: 2

10 May 2017 — In Veritas Backup Exec 2014 before build 14.1.1187.1126, 15 before build 14.2.1180.3160, and 16 before FP1, there is a use-after-free vulnerability in multiple agents that can lead to a denial of service or remote code execution. An unauthenticated attacker can use this vulnerability to crash the agent or potentially take control of the agent process and then the system it is running on. En Veritas Backup Exec 2014 anteriores a la compilación 14.1.1187.1126, 15 anteriores a la compilación 14.2.1180.3160, y ... • https://packetstorm.news/files/id/143192 • CWE-416: Use After Free •

CVSS: 10.0EPSS: 80%CPEs: 57EXPL: 4

17 Aug 2005 — VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server. • https://packetstorm.news/files/id/180901 •

CVSS: 9.8EPSS: 0%CPEs: 17EXPL: 0

29 Jun 2005 — Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server. • http://secunia.com/advisories/15789 •

CVSS: 9.8EPSS: 4%CPEs: 7EXPL: 0

26 Jun 2005 — Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code. • http://marc.info/?l=bugtraq&m=111954711532252&w=2 •

CVSS: 7.5EPSS: 11%CPEs: 2EXPL: 0

26 Jun 2005 — VERITAS Backup Exec 9.0 through 10.0 for Windows Servers, and 9.0.4019 through 9.1.307 for Netware, allows remote attackers to cause a denial of service (Remote Agent crash) via (1) a crafted packet in NDMLSRVR.DLL or (2) a request packet with an invalid (non-0) "Error Status" value, which triggers a null dereference. • http://secunia.com/advisories/15789 • CWE-476: NULL Pointer Dereference •

CVSS: 9.8EPSS: 75%CPEs: 22EXPL: 2

18 Jun 2005 — Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument. • https://www.exploit-db.com/exploits/16332 •

CVSS: 10.0EPSS: 79%CPEs: 5EXPL: 2

22 Dec 2004 — Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname. • https://www.exploit-db.com/exploits/750 •