SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Veritas NetBackup Vendors:   Symantec, Veritas
Veritas NetBackup Multiple Flaws Let Remote Users Obtain Passwords and Execute Arbitrary Code
SecurityTracker Alert ID:  1035704
SecurityTracker URL:  http://securitytracker.com/id/1035704
CVE Reference:   CVE-2015-6550, CVE-2015-6551, CVE-2015-6552   (Links to External Site)
Date:  Apr 28 2016
Impact:   Disclosure of authentication information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.5.x.x, 7.1.x, 7.0.x, 7.1.x, 7.5.x.x, 7.6.0.x, 7.6.1.x, 7.7.1
Description:   Several vulnerabilities were reported in Veritas NetBackup. A remote user can execute arbitrary code on the target system. A remote user can execute arbitrary commands on the target system. A remote user can obtain passwords on the target system.

A remote user can send specially crafted data to the 'bpcd' service to trigger an input validation flaw and execute arbitrary commands on the target system. The code will run with privileged access [CVE-2015-6550].

A remote user on the local network that can monitor communications between the administration console and the NBU server can capture and obtain login credentials [CVE-2015-6551]. Version 7.6.1 is not affected.

A remote user can send specially crafted data to execute arbitrary Remote Procedure Call (RPC) commands and gain full control of the target system [CVE-2015-6552].

Emilien Girault (with ANSSI and via CERT-FR) reported these vulnerabilities.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can execute arbitrary commands on the target system.

A remote user on the local network that can monitor the network can obtain passwords.

Solution:   The vendor has issued a fix (7.7.2; security hotfix for 7.5.0.7, 7.6.0.4, 7.6.1.2, 7.7).

The vendor's advisory is available at:

https://www.veritas.com/content/support/en_US/security/VTS16-001.html

Vendor URL:  www.veritas.com/content/support/en_US/security/VTS16-001.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Solaris - SunOS), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC