Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.802981 |
Kategorie: | Buffer overflow |
Titel: | VERITAS Backup Exec Agent Browser Remote Buffer Overflow Vulnerability |
Zusammenfassung: | This host is running VERITAS Backup Exec Agent Browser and is prone; to buffer overflow vulnerability. |
Beschreibung: | Summary: This host is running VERITAS Backup Exec Agent Browser and is prone to buffer overflow vulnerability. Vulnerability Insight: The name server registration service (benetns.exe) fails to validate the client hostname field during the registration process, which leads into stack-based buffer overflow. Vulnerability Impact: Successful exploitation will allow attackers to overflow a buffer and execute arbitrary code on the system. Affected Software/OS: Veritas Backup Exec Agent Browser version 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40 Solution: Upgrade to Veritas Backup Exec Agent Browser 8.60.3878 Hotfix 68 or 9.1.4691 Hotfix 40 or later. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
BugTraq ID: 11974 Common Vulnerability Exposure (CVE) ID: CVE-2004-1172 http://www.securityfocus.com/bid/11974 CERT/CC vulnerability note: VU#907729 http://www.kb.cert.org/vuls/id/907729 http://www.idefense.com/application/poi/display?id=169 http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php http://secunia.com/advisories/13495/ XForce ISS Database: netbackup-agent-browser-bo(18506) https://exchange.xforce.ibmcloud.com/vulnerabilities/18506 |
Copyright | Copyright (c) 2012 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |