Check Point Reference: | CPAI-2005-222 |
Date Published: | 23 Dec 2009 |
Severity: | High |
Last Updated: | Thursday 17 September, 2015 |
Source: | |
Industry Reference: | CVE-2005-1009 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | NetVault is a multi-platform backup and restore software suite produced by BakBone Software. The product uses a client-server architecture and is capable of networked backup tasks. The product has separate network communication mechanisms to facilitate backup and management functions. The client and server components use proprietary protocols to communicate with each other. A vulnerability exists in BakBone Software's NetVault, an enterprise class backup suite. The vulnerability is caused due to insufficient boundary checking in the communication handling code of both the client and server components. This vulnerability can be exploited remotely by unauthenticated users to execute arbitrary code. A simple attack will result in an unexpected termination of the target service, creating a denial of service condition. The service will not automatically restart by default. In a more sophisticated case, an attacker can remotely inject and execute arbitrary code. Any injected code will executed with system-level privileges. The target's behavior in such a case is dependent on the intent of the injected code. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: BakBone NetVault messages buffer overflow