SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Veritas InfoScale Storage Vendors:   Symantec
VERITAS Storage Foundation for Windows Accepts NULL NTLMSSP Authentication
SecurityTracker Alert ID:  1020699
SecurityTracker URL:  http://securitytracker.com/id/1020699
CVE Reference:   CVE-2008-3703   (Links to External Site)
Updated:  Aug 27 2008
Original Entry Date:  Aug 14 2008
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 5.0, 5.0 RP1a, 5.1
Description:   A vulnerability was reported in VERITAS Storage Foundation for Windows. A remote user can execute arbitrary code on the target system.

A remote user can connect to the Scheduler Service (VxSchedService.exe) on TCP port 4888 and use NULL NTLMSSP authentication to add, modify, or delete snapshots schedules. This allows the remote user to execute arbitrary code with System privileges.

The vendor was notified on August 26, 2008.

Tenable Network Security reported this vulnerability via TippingPoint.

Impact:   A remote user can execute arbitrary code on the target system with System level privileges.
Solution:   The vendor has issued a fix, available at:

http://entsupport.symantec.com/docs/306386

The vendor's advisory is available at:

http://securityresponse.symantec.com/avcenter/security/Content/2008.08.14a.html

Vendor URL:  securityresponse.symantec.com/avcenter/security/Content/2008.08.14a.html (Links to External Site)
Cause:   Authentication error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC