Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   BackupExec Vendors:   Symantec
Veritas Backup Exec for Windows Servers Media Server Format String Bug in BENGINE May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015785
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 17 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Backup Exec for Windows Servers 9.1, 10.0, 10.1
Description:   A vulnerability was reported in Veritas Backup Exec for Windows Servers: Media Server. A remote user may be able to execute arbitrary code on the target system.

The 'BENGINE.exe' component contains a format string vulnerability that can be triggered if job logging is configured with 'full details' enabled (which is not the default configuration).

An authorized user with a system configured for backup can host a file on the system with a specially crafted filename. When the target Media Server system backs up the file, the backup process on the target Media Server may crash or execute arbitrary code.

Impact:   A user on a system that has the backup agent installed may be able to cause arbitrary code to be executed on the target system when the target system attempts to backup the user's system.
Solution:   The vendor has issued hotfixes for version 9.1, 10.0, and 10.1, available at:

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC