Check Point Reference: | CPAI-2005-185 |
Date Published: | 13 Oct 2009 |
Severity: | Critical |
Last Updated: | Tuesday 13 October, 2009 |
Source: | |
Industry Reference: | CVE-2004-1172 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Backup Exec is a backup solution offered by VERITAS. It provides both server-side and client side components and communication mechanisms for scalability and ease of administration purposes. The client-side component is known as the Backup Exec Agent. The Backup Exec Agent Browser is a server component responsible with the discovery of available agents on the network. The VERITAS Backup Exec Agent Browser contains a remotely exploitable buffer overflow vulnerability. A specially crafted registration request, when sent to a vulnerable Agent Browser, can cause a stack buffer to be overrun. This vulnerability may be leveraged by an attacker to execute arbitrary code on the affected system with the privileges of the running Agent Browser service (usually an administrator account). In a simple attack case, the vulnerable VERITAS Backup Exec Browser Agent will terminate upon a successful attack, causing a denial of service condition. The service must be manually restarted after to restore functionality. In a more sophisticated attack, involving code injection, arbitrary code is executed in the security context of the administrator account. In such a case, the behaviour of the target is dependant on the nature of the injected code. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Veritas Backup Exec Protection Violation.
Attack Information: Veritas Backup Exec Agent Browser registration request buffer overflow