CVE-2005-0773

Scores

EPSS

0.752medium75.2%
0%20%40%60%80%100%

Percentile: 75.2%

CVSS

7.5high2.0
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

Exploits

Exploit ID: 16332

Source: exploitdb

URL: https://www.exploit-db.com/exploits/16332

Recommendations

Source: nvd

Apply a patch from the vendor. See http://seer.support.veritas.com/docs/276604.htm for details.WorkaroundUse firewalls to limit connectivity so that only the backup server(s) can connect to the systems being backed up. The standard port for this service is port 10000.At minimum, some basic protection should be in effect at the network boundaries. Individual installations may operate on nonstandard ports, which should be taken into account when developing network traffic filtering rules.Note: even if patching can be done quickly, the above workaround measures should be considered as part of a defense-in-depth strategy for protecting your systems.

URL: http://www.kb.cert.org/vuls/id/492105

Vulnerable Software (1)

Type: Configuration

Vendor: symantec_veritas

Product: backup_exec

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:symantec_veritas:backup_e...

Source: nvd