Search criteria

33 vulnerabilities found for backup_exec by symantec_veritas

FKIE_CVE-2006-4128

Vulnerability from fkie_nvd - Published: 2006-08-14 23:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message.
References
cve@mitre.orghttp://secunia.com/advisories/21472Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/1380
cve@mitre.orghttp://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html
cve@mitre.orghttp://securitytracker.com/id?1016683
cve@mitre.orghttp://seer.entsupport.symantec.com/docs/284623.htmVendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/647796US Government Resource
cve@mitre.orghttp://www.securityfocus.com/archive/1/443037/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/19479
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3266
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28336
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21472Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/1380
af854a3a-2127-422b-91ae-364da2661108http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016683
af854a3a-2127-422b-91ae-364da2661108http://seer.entsupport.symantec.com/docs/284623.htmVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/647796US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/443037/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19479
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3266
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28336

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "E11FD33B-E9E1-4C1D-A3C2-622A99637B3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_build9.1.4691:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "0113460A-3653-471F-8CBC-DADDB8019424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.2:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "F0FE14BC-EC55-41D8-A3B2-01E5D713C537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "4D552062-F18D-4800-9618-C1A5F967F7C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_build10.0.5484:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "398B0C1C-3969-4664-A175-AF149DE701BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_build10.0.5520:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "CA98695D-2217-419A-8CEA-8EE30FEF6A95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "D1C409F7-A4AA-4693-AFB2-8DCA9E9AB928",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.325.6301:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FDC7A0-1BDF-4BE6-ACC0-9508092A07C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.326.1401:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B46764B-6B34-414D-AD39-61A0C645F940",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.326.2501:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E7CF0C-3200-4976-B57B-91BDB8F50C47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.326.3301:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F47DBE4-186F-4064-8FEF-FA36050B2074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1.327.401:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAC413A-B3BA-4AD4-9BD4-0BFC4355451E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.1_build10.1.5629:*:windows_server_remote_agent:*:*:*:*:*",
              "matchCriteriaId": "5CAE4CB5-9716-4C34-A7F2-BA8133ECBA38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message."
    },
    {
      "lang": "es",
      "value": "M\u00faliples desbordamientos de b\u00fafer en Symantec VERITAS Backup Exec para Netware Server Remote Agent para Windows Server 9.1 y 9.2 (todas las construcciones), Backup Exec Continuous Protection Server Remote Agent para Windows Server 10.1 (10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, y 10.1.327.401), y Backup Exec para Windows Server y Remote Agent 9.1 (9.1.4691), 10.0 (10.0.5484 y 10.0.5520), y 10.1 (10.1.5629) permite a un atacante remoto provocar denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de mensajes RPC manipulados."
    }
  ],
  "id": "CVE-2006-4128",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-14T23:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21472"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1380"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016683"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/647796"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19479"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3266"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016683"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/647796"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-1298

Vulnerability from fkie_nvd - Published: 2006-03-19 23:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec.
Impacted products
Vendor Product Version
symantec_veritas backup_exec 9.1
symantec_veritas backup_exec 10.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:windows_servers:*:*:*:*:*",
              "matchCriteriaId": "BD6DC805-9CAB-4CA2-9F69-999F6832B7E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec."
    }
  ],
  "evaluatorSolution": "This vulnerability can only be exploited if the \u0027job log\u0027 mode is set to \"Full Detailed\" (aka Full Details).  Other older versions of Windows Server (those that have been End-Of-Life\u0027d) should be upgraded to the latest patch of one of the current versions listed above.",
  "id": "CVE-2006-1298",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-03-19T23:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19242"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015785"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://support.veritas.com/docs/282254"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/17096"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/0996"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19242"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015785"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://support.veritas.com/docs/282254"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/17096"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0996"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-1297

Vulnerability from fkie_nvd - Published: 2006-03-19 23:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to "memory errors."
Impacted products
Vendor Product Version
symantec_veritas backup_exec netware_server_9.1
symantec_veritas backup_exec netware_server_9.2
symantec_veritas backup_exec_remote_agent netware_server_9.1
symantec_veritas backup_exec_remote_agent netware_server_9.2
symantec_veritas backup_exec_remote_agent unix_linux_server_10.1
symantec_veritas backup_exec_remote_agent windows_server_9.1
symantec_veritas backup_exec_remote_agent windows_server_10.0
symantec_veritas backup_exec_remote_agent windows_server_10.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_server_9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0A3E26-7FE0-4780-A202-8CEF4F752DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_server_9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C4BEBA2-8AA0-48E4-BE26-532837813267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server_9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E2448A-4501-487C-A194-8144F8A14E79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server_9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC86B153-9696-4373-9E30-F7793BB4F3BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server_10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7836C087-7F95-4264-AAB6-706AA6E9AAE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E41CFAC-A992-435A-8DED-E49C2284AD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "81B58325-B79E-4C91-9BF3-601D8CB17037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server_10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCA85325-2513-4C12-93A2-31EF7422A617",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\""
    }
  ],
  "id": "CVE-2006-1297",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-03-19T23:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19242"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/597"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015784"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/17098"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/0995"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19242"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/597"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17098"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0995"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-2611

Vulnerability from fkie_nvd - Published: 2005-08-17 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
References
cve@mitre.orghttp://secunia.com/advisories/16403Patch, Vendor Advisory
cve@mitre.orghttp://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.htmlPatch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1014662Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/378957Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.securityfocus.com/bid/14551Exploit
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA05-224A.htmlThird Party Advisory, US Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/1387
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/21793
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/16403Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1014662Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/378957Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14551Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA05-224A.htmlThird Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/1387
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/21793
Impacted products
Vendor Product Version
symantec_veritas backup_exec netware_servers_9.0.4019
symantec_veritas backup_exec netware_servers_9.0.4170
symantec_veritas backup_exec netware_servers_9.0.4172
symantec_veritas backup_exec netware_servers_9.0.4174
symantec_veritas backup_exec netware_servers_9.0.4202
symantec_veritas backup_exec netware_servers_9.1.306
symantec_veritas backup_exec netware_servers_9.1.307
symantec_veritas backup_exec netware_servers_9.1.1067_.2
symantec_veritas backup_exec netware_servers_9.1.1067_.3
symantec_veritas backup_exec netware_servers_9.1.1127_.1
symantec_veritas backup_exec netware_servers_9.1.1151_.1
symantec_veritas backup_exec netware_servers_9.1.1152
symantec_veritas backup_exec netware_servers_9.1.1152_.4
symantec_veritas backup_exec netware_servers_9.1.1154
symantec_veritas backup_exec netware_servers_9.1.1156
symantec_veritas backup_exec windows_servers_8.6
symantec_veritas backup_exec windows_servers_9.0
symantec_veritas backup_exec windows_servers_9.0_rev._4367
symantec_veritas backup_exec windows_servers_9.0_rev._4367_sp1
symantec_veritas backup_exec windows_servers_9.0_rev._4454
symantec_veritas backup_exec windows_servers_9.0_rev._4454_sp1
symantec_veritas backup_exec windows_servers_9.1
symantec_veritas backup_exec windows_servers_9.1_rev._4691
symantec_veritas backup_exec windows_servers_9.1_rev._4691_sp2
symantec_veritas backup_exec windows_servers_10.0_rev._5484
symantec_veritas backup_exec windows_servers_10.0_rev._5484_sp1
symantec_veritas backup_exec windows_servers_10.0_rev._5520
symantec_veritas backup_exec_remote_agent netware_server
symantec_veritas backup_exec_remote_agent unix_linux_server
symantec_veritas backup_exec_remote_agent windows_server
symantec_veritas netbackup netware_media_servers_4.5
symantec_veritas netbackup netware_media_servers_4.5_fp1
symantec_veritas netbackup netware_media_servers_4.5_fp2
symantec_veritas netbackup netware_media_servers_4.5_fp3
symantec_veritas netbackup netware_media_servers_4.5_fp4
symantec_veritas netbackup netware_media_servers_4.5_fp5
symantec_veritas netbackup netware_media_servers_4.5_fp6
symantec_veritas netbackup netware_media_servers_4.5_fp7
symantec_veritas netbackup netware_media_servers_4.5_fp8
symantec_veritas netbackup netware_media_servers_4.5_mp1
symantec_veritas netbackup netware_media_servers_4.5_mp2
symantec_veritas netbackup netware_media_servers_4.5_mp3
symantec_veritas netbackup netware_media_servers_4.5_mp4
symantec_veritas netbackup netware_media_servers_4.5_mp5
symantec_veritas netbackup netware_media_servers_4.5_mp6
symantec_veritas netbackup netware_media_servers_4.5_mp7
symantec_veritas netbackup netware_media_servers_4.5_mp8
symantec_veritas netbackup netware_media_servers_5.0
symantec_veritas netbackup netware_media_servers_5.0_mp1
symantec_veritas netbackup netware_media_servers_5.0_mp2
symantec_veritas netbackup netware_media_servers_5.0_mp3
symantec_veritas netbackup netware_media_servers_5.0_mp4
symantec_veritas netbackup netware_media_servers_5.0_mp5
symantec_veritas netbackup netware_media_servers_5.1
symantec_veritas netbackup netware_media_servers_5.1_mp1
symantec_veritas netbackup netware_media_servers_5.1_mp2
symantec_veritas netbackup netware_media_servers_5.1_mp3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4019:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24230F6-26C4-4A09-BEB0-BF4E5B8A83F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4170:*:*:*:*:*:*:*",
              "matchCriteriaId": "A49730A7-4C5B-4130-A194-63BCB0C0DB62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4172:*:*:*:*:*:*:*",
              "matchCriteriaId": "9247F741-16D7-40B3-9037-326270AE1A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4174:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEBFD68D-E56E-4B95-AA70-CA2FC371AF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4202:*:*:*:*:*:*:*",
              "matchCriteriaId": "44B5CC50-7D43-493F-8DD5-56807CFFB56C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.306:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A59088D-B16C-4508-8594-4F9A66702914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.307:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6B20BEF-0D8F-412E-8AE3-9D660BF89C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7C5BF9-5780-435D-9F42-5F2712A9C612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "17278449-4647-418C-A43F-980EDCE47E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1127_.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4EC8908-5A6E-4BE7-9AB6-A96E331392F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1151_.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BE7C8D6-CCFF-4C67-BD53-12519510A904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152:*:*:*:*:*:*:*",
              "matchCriteriaId": "86CD25F2-2F58-4468-9898-15CE0701BBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152_.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB00211-2397-4444-B8E2-FD05344FE05A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1154:*:*:*:*:*:*:*",
              "matchCriteriaId": "58ED7E29-8BFA-460F-B2C9-651DF9D31D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1156:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DEFCF58-B287-4299-92FE-5077A52ADFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6375C88-EF6D-44E5-8445-788FB8B8DCDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C778849-F5FE-4C4D-BED3-B4E59D18E5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367:*:*:*:*:*:*:*",
              "matchCriteriaId": "E034329F-003A-4A76-9146-8C3A216DEDD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "724349E3-8152-4FF3-8617-6399B13B5332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BA959E-A95D-4828-9FE5-7A5D82627A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F02B3EF2-1327-4138-B8E1-BEFEAABC4066",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF573CC6-E3A5-49A0-9D64-C7D82EE87903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691:*:*:*:*:*:*:*",
              "matchCriteriaId": "30AB7137-F41A-420F-9C01-FBB3E012CDFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691_sp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FDD5FDA-B5D4-4C93-A83E-3B7A1B89F02D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E65B29-5535-4818-ADF9-0E880AE152FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBBC7B82-58F9-4D75-B910-5287B7FA3720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5520:*:*:*:*:*:*:*",
              "matchCriteriaId": "46AD7EE2-DA3A-4877-B29D-71650B255061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4823F99-C0BA-43E1-AA7F-E35415D6C279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server:*:*:*:*:*:*:*",
              "matchCriteriaId": "19977C9B-BD6C-45A4-AB33-31C7BB00782D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE4468B-241C-4F20-BC43-5A24F187014A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5081924-EAEB-4BAC-A6A9-A23587654D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B4EC4ED-AD7A-4D07-B105-D8BC11267942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C8A41C7-1AB9-443D-BB23-F31144DFAFD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D5585D-CBC1-4209-A990-33DCE08BD10D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D927248C-CD93-4266-8018-06546BDE0F46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F4076FB-45BD-46B8-AAB7-B46EA7901C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3593F48-41BF-44E2-B91C-BA2A895FB100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp7:*:*:*:*:*:*:*",
              "matchCriteriaId": "616B1E3A-D14E-4C88-BA71-84C060A13A3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F86FDE-00EF-4166-B079-E0E69DD90A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6CE835-E847-4ED5-A8BC-1F5B363D057F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1CD6F4-BC8B-45DE-A978-1537E3A87689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69CBF588-B9FB-463B-BEE2-AC6D841EE81D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F638B809-E7E7-49FD-8CFE-08595B287D83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD1DB09-DCC8-43DA-A27F-5388716FF013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp6:*:*:*:*:*:*:*",
              "matchCriteriaId": "242E0063-43B4-4ADD-AB51-E4491509F83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp7:*:*:*:*:*:*:*",
              "matchCriteriaId": "951B5532-C019-4B80-94A8-61DE2D084589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F658FB82-5BF8-437E-BABA-14FFCDE3332F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D5E1821-A0D8-42CC-B0EF-A4C7EAB6D173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04483F1-F206-4693-870F-84FFA310F6DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D342EB5-8DA1-4573-9EA3-210C94A883E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "56E9E8E6-E6B9-42E4-BF40-8CC402A7AF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F114D1-1D7B-41C3-A735-6F60C7B41460",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D74B8A14-1CD5-49C1-AF30-AE37796C9030",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE510737-B5FD-4B10-8062-AB90A57F3958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE1E8843-29A8-41EB-8689-C5E02791E8D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA48FEAB-AD82-4648-AC9E-B2C72AA27BAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB12220-726E-4B32-BEEF-63B2E450F4D7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
    }
  ],
  "id": "CVE-2005-2611",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-17T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16403"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1014662"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/378957"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/14551"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/1387"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1014662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/378957"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/14551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/1387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-2079

Vulnerability from fkie_nvd - Published: 2005-08-02 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code.
Impacted products
Vendor Product Version
symantec_veritas backup_exec 9.0_rev.4367
symantec_veritas backup_exec 9.0_rev.4454
symantec_veritas backup_exec 9.1_rev.4691
symantec_veritas backup_exec 10.0_rev.5484

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*",
              "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en Admin Plus Pack Option for VERITAS Backup Exec 9.0 hasta 10.0 para Windows Servers  permite que atacantes remotos ejecuten c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2005-2079",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276607.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/352625"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14023"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276607.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/352625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-2080

Vulnerability from fkie_nvd - Published: 2005-06-29 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "357967B9-D397-459B-A71A-FEBE0BCB8B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D53EB23-4971-408E-A43F-009698C403A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4170:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F763B05-25F3-42B6-A90E-2454910B6AB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4172:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4609B0F-3F5C-464E-92B1-ED6AF3C4FB75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4174:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D899BF-F90C-43AD-8C17-CF59EE116BCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4202:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB1DD40C-E044-45D7-919E-6DC0749FEF0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.306:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1CD60F-847D-41D1-96C2-993E894F3EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.307:*:*:*:*:*:*:*",
              "matchCriteriaId": "376EA812-8D27-4321-96CC-36848FE8856D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "571BAEAC-E97D-4127-8C44-00206714587A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D17C351-CC27-4F3C-8024-0D7461534797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1127.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA711692-B9F2-4898-998D-7916C6572EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1151.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B4C81C-2706-461F-9516-A4CB055FE865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152:*:*:*:*:*:*:*",
              "matchCriteriaId": "183AE69A-BFCA-4AA4-AB08-18189AF7EE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2301AB87-1080-4C9E-81EC-91040AF882A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1154:*:*:*:*:*:*:*",
              "matchCriteriaId": "B312041E-57BE-48EF-B1FD-8F8B85D5AC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B94533F3-8954-4772-92A6-7E3EE29D3162",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server."
    }
  ],
  "id": "CVE-2005-2080",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-29T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276608.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14026"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276608.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14026"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-2051

Vulnerability from fkie_nvd - Published: 2005-06-28 04:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "357967B9-D397-459B-A71A-FEBE0BCB8B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*",
              "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B94533F3-8954-4772-92A6-7E3EE29D3162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code."
    }
  ],
  "id": "CVE-2005-2051",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-28T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276606.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276606.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14025"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-0771

Vulnerability from fkie_nvd - Published: 2005-06-23 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
Impacted products
Vendor Product Version
symantec_veritas backup_exec 9.0_rev.4367
symantec_veritas backup_exec 9.0_rev.4454
symantec_veritas backup_exec 9.1_rev.4691
symantec_veritas backup_exec 10.0_rev.5484

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*",
              "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106."
    }
  ],
  "id": "CVE-2005-0771",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-23T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014273"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276605.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/584505"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276605.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/584505"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-0773

Vulnerability from fkie_nvd - Published: 2005-06-18 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.
References
cve@mitre.orghttp://secunia.com/advisories/15789Patch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1014273Patch
cve@mitre.orghttp://seer.support.veritas.com/docs/276604.htmPatch, Vendor Advisory
cve@mitre.orghttp://seer.support.veritas.com/docs/277429.htmPatch
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=272&type=vulnerabilities&flashstatus=trueVendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/492105Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.osvdb.org/17624
cve@mitre.orghttp://www.securityfocus.com/bid/14022Exploit, Patch
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA05-180A.htmlPatch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/15789Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1014273Patch
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/276604.htmPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/277429.htmPatch
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=272&type=vulnerabilities&flashstatus=trueVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/492105Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/17624
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14022Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA05-180A.htmlPatch, Third Party Advisory, US Government Resource

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D53EB23-4971-408E-A43F-009698C403A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4170:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F763B05-25F3-42B6-A90E-2454910B6AB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4172:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4609B0F-3F5C-464E-92B1-ED6AF3C4FB75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4174:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D899BF-F90C-43AD-8C17-CF59EE116BCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0.4202:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB1DD40C-E044-45D7-919E-6DC0749FEF0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BAD90A9-B5AA-4D6A-9207-2A302BD2774C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F669C0-D20D-49B1-A486-6DE6FF8A186F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*",
              "matchCriteriaId": "555367EF-249E-4310-8A06-E59947D33576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B53EE99-ACFE-42FD-BA9A-379913E4D329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.306:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1CD60F-847D-41D1-96C2-993E894F3EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.307:*:*:*:*:*:*:*",
              "matchCriteriaId": "376EA812-8D27-4321-96CC-36848FE8856D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "571BAEAC-E97D-4127-8C44-00206714587A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D17C351-CC27-4F3C-8024-0D7461534797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1127.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA711692-B9F2-4898-998D-7916C6572EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1151.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B4C81C-2706-461F-9516-A4CB055FE865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152:*:*:*:*:*:*:*",
              "matchCriteriaId": "183AE69A-BFCA-4AA4-AB08-18189AF7EE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2301AB87-1080-4C9E-81EC-91040AF882A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1.1154:*:*:*:*:*:*:*",
              "matchCriteriaId": "B312041E-57BE-48EF-B1FD-8F8B85D5AC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B969FA8-F5F8-4C34-A99F-1630EAD4EA18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691_sp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD59ED0-F1FD-42BD-9078-3A603FC4B899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FFFB18-9F1D-4630-BD13-0F34A1D6E5D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52E569BF-72BD-49DE-8946-E575C677F06B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument."
    }
  ],
  "id": "CVE-2005-0773",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-18T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014273"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276604.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/492105"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/17624"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/14022"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.support.veritas.com/docs/276604.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://seer.support.veritas.com/docs/277429.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/492105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/17624"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/14022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2004-1172

Vulnerability from fkie_nvd - Published: 2005-01-10 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
References
cve@mitre.orghttp://secunia.com/advisories/13495/
cve@mitre.orghttp://seer.support.veritas.com/docs/273419.htm
cve@mitre.orghttp://seer.support.veritas.com/docs/273420.htm
cve@mitre.orghttp://seer.support.veritas.com/docs/273422.htm
cve@mitre.orghttp://seer.support.veritas.com/docs/273850.htm
cve@mitre.orghttp://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=169
cve@mitre.orghttp://www.kb.cert.org/vuls/id/907729US Government Resource
cve@mitre.orghttp://www.securityfocus.com/bid/11974Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18506
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13495/
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/273419.htm
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/273420.htm
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/273422.htm
af854a3a-2127-422b-91ae-364da2661108http://seer.support.veritas.com/docs/273850.htm
af854a3a-2127-422b-91ae-364da2661108http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=169
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/907729US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11974Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18506

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D3D2DE8-D26F-4EB7-895F-F0764749395D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9359E8-65FF-4C46-8CB4-1E699EE767E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFDC7581-00EF-45FB-A50C-C1ED1EA7E247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "357967B9-D397-459B-A71A-FEBE0BCB8B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec_veritas:backup_exec:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A5E1B0-A0CA-4F40-92A0-2F214C6D8032",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname."
    }
  ],
  "id": "CVE-2004-1172",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-01-10T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/13495/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seer.support.veritas.com/docs/273419.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seer.support.veritas.com/docs/273420.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seer.support.veritas.com/docs/273422.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seer.support.veritas.com/docs/273850.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.idefense.com/application/poi/display?id=169"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/907729"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11974"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/13495/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seer.support.veritas.com/docs/273419.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seer.support.veritas.com/docs/273420.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seer.support.veritas.com/docs/273422.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seer.support.veritas.com/docs/273850.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.idefense.com/application/poi/display?id=169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/907729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2006-4128 (GCVE-0-2006-4128)

Vulnerability from cvelistv5 – Published: 2006-08-14 23:00 – Updated: 2024-08-07 18:57
VLAI?
Summary
Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1016683 vdb-entryx_refsource_SECTRACK
http://seer.entsupport.symantec.com/docs/284623.htm x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/archive/1/443037/100… mailing-listx_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/647796 third-party-advisoryx_refsource_CERT-VN
http://securityresponse.symantec.com/avcenter/sec… x_refsource_CONFIRM
http://securityreason.com/securityalert/1380 third-party-advisoryx_refsource_SREASON
http://www.vupen.com/english/advisories/2006/3266 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/19479 vdb-entryx_refsource_BID
http://secunia.com/advisories/21472 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:57:46.261Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1016683",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016683"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
          },
          {
            "name": "backupexec-rpc-interface-bo(28336)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
          },
          {
            "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
          },
          {
            "name": "VU#647796",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/647796"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
          },
          {
            "name": "1380",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1380"
          },
          {
            "name": "ADV-2006-3266",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3266"
          },
          {
            "name": "19479",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19479"
          },
          {
            "name": "21472",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21472"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1016683",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016683"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
        },
        {
          "name": "backupexec-rpc-interface-bo(28336)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
        },
        {
          "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
        },
        {
          "name": "VU#647796",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/647796"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
        },
        {
          "name": "1380",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1380"
        },
        {
          "name": "ADV-2006-3266",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3266"
        },
        {
          "name": "19479",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19479"
        },
        {
          "name": "21472",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21472"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4128",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1016683",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016683"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/284623.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
            },
            {
              "name": "backupexec-rpc-interface-bo(28336)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
            },
            {
              "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
            },
            {
              "name": "VU#647796",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/647796"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
            },
            {
              "name": "1380",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1380"
            },
            {
              "name": "ADV-2006-3266",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3266"
            },
            {
              "name": "19479",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19479"
            },
            {
              "name": "21472",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21472"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4128",
    "datePublished": "2006-08-14T23:00:00",
    "dateReserved": "2006-08-14T00:00:00",
    "dateUpdated": "2024-08-07T18:57:46.261Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1298 (GCVE-0-2006-1298)

Vulnerability from cvelistv5 – Published: 2006-03-19 23:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.944Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060320 Symantec Security Advisory, SYM06-005",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.veritas.com/docs/282254"
          },
          {
            "name": "ADV-2006-0996",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0996"
          },
          {
            "name": "1015785",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015785"
          },
          {
            "name": "19242",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19242"
          },
          {
            "name": "backupexec-bengine-format-string(25310)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
          },
          {
            "name": "17096",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17096"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060320 Symantec Security Advisory, SYM06-005",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.veritas.com/docs/282254"
        },
        {
          "name": "ADV-2006-0996",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0996"
        },
        {
          "name": "1015785",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015785"
        },
        {
          "name": "19242",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19242"
        },
        {
          "name": "backupexec-bengine-format-string(25310)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
        },
        {
          "name": "17096",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17096"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1298",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060320 Symantec Security Advisory, SYM06-005",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
            },
            {
              "name": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html",
              "refsource": "CONFIRM",
              "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
            },
            {
              "name": "http://support.veritas.com/docs/282254",
              "refsource": "CONFIRM",
              "url": "http://support.veritas.com/docs/282254"
            },
            {
              "name": "ADV-2006-0996",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0996"
            },
            {
              "name": "1015785",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015785"
            },
            {
              "name": "19242",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19242"
            },
            {
              "name": "backupexec-bengine-format-string(25310)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
            },
            {
              "name": "17096",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17096"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1298",
    "datePublished": "2006-03-19T23:00:00",
    "dateReserved": "2006-03-19T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.944Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1297 (GCVE-0-2006-1297)

Vulnerability from cvelistv5 – Published: 2006-03-19 23:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to "memory errors."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1015784 vdb-entryx_refsource_SECTRACK
http://securityreason.com/securityalert/597 third-party-advisoryx_refsource_SREASON
http://www.symantec.com/avcenter/security/Content… x_refsource_CONFIRM
http://www.securityfocus.com/bid/17098 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2006/0995 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/428016/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/19242 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.956Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1015784",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015784"
          },
          {
            "name": "597",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/597"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
          },
          {
            "name": "17098",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17098"
          },
          {
            "name": "backupexec-app-memory-dos(25309)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
          },
          {
            "name": "ADV-2006-0995",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0995"
          },
          {
            "name": "20060317 Symantec Security Advisory SYM06-004",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
          },
          {
            "name": "19242",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19242"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1015784",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015784"
        },
        {
          "name": "597",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/597"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
        },
        {
          "name": "17098",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17098"
        },
        {
          "name": "backupexec-app-memory-dos(25309)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
        },
        {
          "name": "ADV-2006-0995",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0995"
        },
        {
          "name": "20060317 Symantec Security Advisory SYM06-004",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
        },
        {
          "name": "19242",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19242"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1297",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1015784",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015784"
            },
            {
              "name": "597",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/597"
            },
            {
              "name": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html",
              "refsource": "CONFIRM",
              "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
            },
            {
              "name": "17098",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17098"
            },
            {
              "name": "backupexec-app-memory-dos(25309)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
            },
            {
              "name": "ADV-2006-0995",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0995"
            },
            {
              "name": "20060317 Symantec Security Advisory SYM06-004",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
            },
            {
              "name": "19242",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19242"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1297",
    "datePublished": "2006-03-19T23:00:00",
    "dateReserved": "2006-03-19T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.956Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2611 (GCVE-0-2005-2611)

Vulnerability from cvelistv5 – Published: 2005-08-17 04:00 – Updated: 2024-08-07 22:30
VLAI?
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.us-cert.gov/cas/techalerts/TA05-224A.html third-party-advisoryx_refsource_CERT
http://www.securityfocus.com/bid/14551 vdb-entryx_refsource_BID
http://secunia.com/advisories/16403 third-party-advisoryx_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/378957 third-party-advisoryx_refsource_CERT-VN
http://www.vupen.com/english/advisories/2005/1387 vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://securityresponse.symantec.com/avcenter/sec… x_refsource_CONFIRM
http://securitytracker.com/id?1014662 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.838Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "TA05-224A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
          },
          {
            "name": "14551",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14551"
          },
          {
            "name": "16403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16403"
          },
          {
            "name": "VU#378957",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/378957"
          },
          {
            "name": "ADV-2005-1387",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/1387"
          },
          {
            "name": "backupexec-ndmp-gain-access(21793)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
          },
          {
            "name": "1014662",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014662"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "TA05-224A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
        },
        {
          "name": "14551",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14551"
        },
        {
          "name": "16403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16403"
        },
        {
          "name": "VU#378957",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/378957"
        },
        {
          "name": "ADV-2005-1387",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/1387"
        },
        {
          "name": "backupexec-ndmp-gain-access(21793)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
        },
        {
          "name": "1014662",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014662"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2611",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "TA05-224A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
            },
            {
              "name": "14551",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14551"
            },
            {
              "name": "16403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16403"
            },
            {
              "name": "VU#378957",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/378957"
            },
            {
              "name": "ADV-2005-1387",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/1387"
            },
            {
              "name": "backupexec-ndmp-gain-access(21793)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
            },
            {
              "name": "1014662",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014662"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2611",
    "datePublished": "2005-08-17T04:00:00",
    "dateReserved": "2005-08-17T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.838Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2080 (GCVE-0-2005-2080)

Vulnerability from cvelistv5 – Published: 2005-06-29 04:00 – Updated: 2024-08-07 22:15
VLAI?
Summary
Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:15:37.357Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "14026",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14026"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276608.htm"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-31T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "14026",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14026"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276608.htm"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2080",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "14026",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14026"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276608.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276608.htm"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2080",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-06-29T00:00:00",
    "dateUpdated": "2024-08-07T22:15:37.357Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2079 (GCVE-0-2005-2079)

Vulnerability from cvelistv5 – Published: 2005-06-29 04:00 – Updated: 2024-08-07 22:15
VLAI?
Summary
Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://seer.support.veritas.com/docs/276607.htm x_refsource_CONFIRM
http://www.kb.cert.org/vuls/id/352625 third-party-advisoryx_refsource_CERT-VN
http://seer.support.veritas.com/docs/277429.htm x_refsource_CONFIRM
http://www.us-cert.gov/cas/techalerts/TA05-180A.html third-party-advisoryx_refsource_CERT
http://www.securityfocus.com/bid/14023 vdb-entryx_refsource_BID
http://secunia.com/advisories/15789 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:15:37.313Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276607.htm"
          },
          {
            "name": "VU#352625",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/352625"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "name": "TA05-180A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
          },
          {
            "name": "14023",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14023"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-31T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276607.htm"
        },
        {
          "name": "VU#352625",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/352625"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "name": "TA05-180A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
        },
        {
          "name": "14023",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14023"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2079",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://seer.support.veritas.com/docs/276607.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276607.htm"
            },
            {
              "name": "VU#352625",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/352625"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "TA05-180A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
            },
            {
              "name": "14023",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14023"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2079",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-06-29T00:00:00",
    "dateUpdated": "2024-08-07T22:15:37.313Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0771 (GCVE-0-2005-0771)

Vulnerability from cvelistv5 – Published: 2005-06-29 04:00 – Updated: 2024-08-07 21:28
VLAI?
Summary
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1014273 vdb-entryx_refsource_SECTRACK
http://www.kb.cert.org/vuls/id/584505 third-party-advisoryx_refsource_CERT-VN
http://www.idefense.com/application/poi/display?i… third-party-advisoryx_refsource_IDEFENSE
http://www.us-cert.gov/cas/techalerts/TA05-180A.html third-party-advisoryx_refsource_CERT
http://secunia.com/advisories/15789 third-party-advisoryx_refsource_SECUNIA
http://seer.support.veritas.com/docs/277429.htm x_refsource_CONFIRM
http://seer.support.veritas.com/docs/276605.htm x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:28.202Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1014273",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014273"
          },
          {
            "name": "VU#584505",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/584505"
          },
          {
            "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
          },
          {
            "name": "TA05-180A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276605.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-15T16:39:34",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1014273",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014273"
        },
        {
          "name": "VU#584505",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/584505"
        },
        {
          "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
        },
        {
          "name": "TA05-180A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276605.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0771",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1014273",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014273"
            },
            {
              "name": "VU#584505",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/584505"
            },
            {
              "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
            },
            {
              "name": "TA05-180A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276605.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276605.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0771",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-03-18T00:00:00",
    "dateUpdated": "2024-08-07T21:28:28.202Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0773 (GCVE-0-2005-0773)

Vulnerability from cvelistv5 – Published: 2005-06-29 04:00 – Updated: 2024-08-07 21:28
VLAI?
Summary
Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.kb.cert.org/vuls/id/492105 third-party-advisoryx_refsource_CERT-VN
http://securitytracker.com/id?1014273 vdb-entryx_refsource_SECTRACK
http://www.osvdb.org/17624 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/14022 vdb-entryx_refsource_BID
http://seer.support.veritas.com/docs/277429.htm x_refsource_CONFIRM
http://seer.support.veritas.com/docs/276604.htm x_refsource_CONFIRM
http://www.idefense.com/application/poi/display?i… third-party-advisoryx_refsource_IDEFENSE
http://www.us-cert.gov/cas/techalerts/TA05-180A.html third-party-advisoryx_refsource_CERT
http://secunia.com/advisories/15789 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:28.409Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#492105",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/492105"
          },
          {
            "name": "1014273",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014273"
          },
          {
            "name": "17624",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17624"
          },
          {
            "name": "14022",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14022"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276604.htm"
          },
          {
            "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
          },
          {
            "name": "TA05-180A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-14T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#492105",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/492105"
        },
        {
          "name": "1014273",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014273"
        },
        {
          "name": "17624",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17624"
        },
        {
          "name": "14022",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14022"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276604.htm"
        },
        {
          "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
        },
        {
          "name": "TA05-180A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0773",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#492105",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/492105"
            },
            {
              "name": "1014273",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014273"
            },
            {
              "name": "17624",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17624"
            },
            {
              "name": "14022",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14022"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276604.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276604.htm"
            },
            {
              "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
            },
            {
              "name": "TA05-180A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0773",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-03-18T00:00:00",
    "dateUpdated": "2024-08-07T21:28:28.409Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2051 (GCVE-0-2005-2051)

Vulnerability from cvelistv5 – Published: 2005-06-26 04:00 – Updated: 2024-08-07 22:15
VLAI?
Summary
Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.ciac.org/ciac/bulletins/p-232.shtml third-party-advisorygovernment-resourcex_refsource_CIAC
http://www.securityfocus.com/bid/14025 vdb-entryx_refsource_BID
http://seer.support.veritas.com/docs/276606.htm x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=111954711532252&w=2 mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/15789 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:15:36.839Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "P-232",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
          },
          {
            "name": "14025",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14025"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276606.htm"
          },
          {
            "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "P-232",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
        },
        {
          "name": "14025",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14025"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276606.htm"
        },
        {
          "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2051",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "P-232",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
            },
            {
              "name": "14025",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14025"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276606.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276606.htm"
            },
            {
              "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2051",
    "datePublished": "2005-06-26T04:00:00",
    "dateReserved": "2005-06-26T00:00:00",
    "dateUpdated": "2024-08-07T22:15:36.839Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-1172 (GCVE-0-2004-1172)

Vulnerability from cvelistv5 – Published: 2004-12-22 05:00 – Updated: 2024-08-08 00:39
VLAI?
Summary
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:39:01.126Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273419.htm"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
          },
          {
            "name": "11974",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11974"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273850.htm"
          },
          {
            "name": "VU#907729",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/907729"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273422.htm"
          },
          {
            "name": "13495",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13495/"
          },
          {
            "name": "netbackup-agent-browser-bo(18506)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273420.htm"
          },
          {
            "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=169"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273419.htm"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
        },
        {
          "name": "11974",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11974"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273850.htm"
        },
        {
          "name": "VU#907729",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/907729"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273422.htm"
        },
        {
          "name": "13495",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13495/"
        },
        {
          "name": "netbackup-agent-browser-bo(18506)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273420.htm"
        },
        {
          "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=169"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1172",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://seer.support.veritas.com/docs/273419.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273419.htm"
            },
            {
              "name": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php",
              "refsource": "MISC",
              "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
            },
            {
              "name": "11974",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11974"
            },
            {
              "name": "http://seer.support.veritas.com/docs/273850.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273850.htm"
            },
            {
              "name": "VU#907729",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/907729"
            },
            {
              "name": "http://seer.support.veritas.com/docs/273422.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273422.htm"
            },
            {
              "name": "13495",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13495/"
            },
            {
              "name": "netbackup-agent-browser-bo(18506)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
            },
            {
              "name": "http://seer.support.veritas.com/docs/273420.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273420.htm"
            },
            {
              "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=169"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1172",
    "datePublished": "2004-12-22T05:00:00",
    "dateReserved": "2004-12-13T00:00:00",
    "dateUpdated": "2024-08-08T00:39:01.126Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4128 (GCVE-0-2006-4128)

Vulnerability from nvd – Published: 2006-08-14 23:00 – Updated: 2024-08-07 18:57
VLAI?
Summary
Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1016683 vdb-entryx_refsource_SECTRACK
http://seer.entsupport.symantec.com/docs/284623.htm x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/archive/1/443037/100… mailing-listx_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/647796 third-party-advisoryx_refsource_CERT-VN
http://securityresponse.symantec.com/avcenter/sec… x_refsource_CONFIRM
http://securityreason.com/securityalert/1380 third-party-advisoryx_refsource_SREASON
http://www.vupen.com/english/advisories/2006/3266 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/19479 vdb-entryx_refsource_BID
http://secunia.com/advisories/21472 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:57:46.261Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1016683",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016683"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
          },
          {
            "name": "backupexec-rpc-interface-bo(28336)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
          },
          {
            "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
          },
          {
            "name": "VU#647796",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/647796"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
          },
          {
            "name": "1380",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1380"
          },
          {
            "name": "ADV-2006-3266",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3266"
          },
          {
            "name": "19479",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19479"
          },
          {
            "name": "21472",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21472"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1016683",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016683"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
        },
        {
          "name": "backupexec-rpc-interface-bo(28336)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
        },
        {
          "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
        },
        {
          "name": "VU#647796",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/647796"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
        },
        {
          "name": "1380",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1380"
        },
        {
          "name": "ADV-2006-3266",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3266"
        },
        {
          "name": "19479",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19479"
        },
        {
          "name": "21472",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21472"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4128",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1016683",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016683"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/284623.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/284623.htm"
            },
            {
              "name": "backupexec-rpc-interface-bo(28336)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28336"
            },
            {
              "name": "20060811 (Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/443037/100/0/threaded"
            },
            {
              "name": "VU#647796",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/647796"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.08.11.html"
            },
            {
              "name": "1380",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1380"
            },
            {
              "name": "ADV-2006-3266",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3266"
            },
            {
              "name": "19479",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19479"
            },
            {
              "name": "21472",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21472"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4128",
    "datePublished": "2006-08-14T23:00:00",
    "dateReserved": "2006-08-14T00:00:00",
    "dateUpdated": "2024-08-07T18:57:46.261Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1298 (GCVE-0-2006-1298)

Vulnerability from nvd – Published: 2006-03-19 23:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.944Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060320 Symantec Security Advisory, SYM06-005",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.veritas.com/docs/282254"
          },
          {
            "name": "ADV-2006-0996",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0996"
          },
          {
            "name": "1015785",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015785"
          },
          {
            "name": "19242",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19242"
          },
          {
            "name": "backupexec-bengine-format-string(25310)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
          },
          {
            "name": "17096",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17096"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060320 Symantec Security Advisory, SYM06-005",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.veritas.com/docs/282254"
        },
        {
          "name": "ADV-2006-0996",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0996"
        },
        {
          "name": "1015785",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015785"
        },
        {
          "name": "19242",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19242"
        },
        {
          "name": "backupexec-bengine-format-string(25310)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
        },
        {
          "name": "17096",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17096"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1298",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060320 Symantec Security Advisory, SYM06-005",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/428223/100/0/threaded"
            },
            {
              "name": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html",
              "refsource": "CONFIRM",
              "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17b.html"
            },
            {
              "name": "http://support.veritas.com/docs/282254",
              "refsource": "CONFIRM",
              "url": "http://support.veritas.com/docs/282254"
            },
            {
              "name": "ADV-2006-0996",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0996"
            },
            {
              "name": "1015785",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015785"
            },
            {
              "name": "19242",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19242"
            },
            {
              "name": "backupexec-bengine-format-string(25310)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25310"
            },
            {
              "name": "17096",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17096"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1298",
    "datePublished": "2006-03-19T23:00:00",
    "dateReserved": "2006-03-19T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.944Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1297 (GCVE-0-2006-1297)

Vulnerability from nvd – Published: 2006-03-19 23:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to "memory errors."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1015784 vdb-entryx_refsource_SECTRACK
http://securityreason.com/securityalert/597 third-party-advisoryx_refsource_SREASON
http://www.symantec.com/avcenter/security/Content… x_refsource_CONFIRM
http://www.securityfocus.com/bid/17098 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2006/0995 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/428016/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/19242 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.956Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1015784",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015784"
          },
          {
            "name": "597",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/597"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
          },
          {
            "name": "17098",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17098"
          },
          {
            "name": "backupexec-app-memory-dos(25309)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
          },
          {
            "name": "ADV-2006-0995",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0995"
          },
          {
            "name": "20060317 Symantec Security Advisory SYM06-004",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
          },
          {
            "name": "19242",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19242"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1015784",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015784"
        },
        {
          "name": "597",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/597"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
        },
        {
          "name": "17098",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17098"
        },
        {
          "name": "backupexec-app-memory-dos(25309)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
        },
        {
          "name": "ADV-2006-0995",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0995"
        },
        {
          "name": "20060317 Symantec Security Advisory SYM06-004",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
        },
        {
          "name": "19242",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19242"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1297",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to \"memory errors.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1015784",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015784"
            },
            {
              "name": "597",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/597"
            },
            {
              "name": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html",
              "refsource": "CONFIRM",
              "url": "http://www.symantec.com/avcenter/security/Content/2006.03.17a.html"
            },
            {
              "name": "17098",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17098"
            },
            {
              "name": "backupexec-app-memory-dos(25309)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25309"
            },
            {
              "name": "ADV-2006-0995",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0995"
            },
            {
              "name": "20060317 Symantec Security Advisory SYM06-004",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/428016/100/0/threaded"
            },
            {
              "name": "19242",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19242"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1297",
    "datePublished": "2006-03-19T23:00:00",
    "dateReserved": "2006-03-19T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.956Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2611 (GCVE-0-2005-2611)

Vulnerability from nvd – Published: 2005-08-17 04:00 – Updated: 2024-08-07 22:30
VLAI?
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.us-cert.gov/cas/techalerts/TA05-224A.html third-party-advisoryx_refsource_CERT
http://www.securityfocus.com/bid/14551 vdb-entryx_refsource_BID
http://secunia.com/advisories/16403 third-party-advisoryx_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/378957 third-party-advisoryx_refsource_CERT-VN
http://www.vupen.com/english/advisories/2005/1387 vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://securityresponse.symantec.com/avcenter/sec… x_refsource_CONFIRM
http://securitytracker.com/id?1014662 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.838Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "TA05-224A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
          },
          {
            "name": "14551",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14551"
          },
          {
            "name": "16403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16403"
          },
          {
            "name": "VU#378957",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/378957"
          },
          {
            "name": "ADV-2005-1387",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/1387"
          },
          {
            "name": "backupexec-ndmp-gain-access(21793)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
          },
          {
            "name": "1014662",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014662"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "TA05-224A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
        },
        {
          "name": "14551",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14551"
        },
        {
          "name": "16403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16403"
        },
        {
          "name": "VU#378957",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/378957"
        },
        {
          "name": "ADV-2005-1387",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/1387"
        },
        {
          "name": "backupexec-ndmp-gain-access(21793)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
        },
        {
          "name": "1014662",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014662"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2611",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "TA05-224A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
            },
            {
              "name": "14551",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14551"
            },
            {
              "name": "16403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16403"
            },
            {
              "name": "VU#378957",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/378957"
            },
            {
              "name": "ADV-2005-1387",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/1387"
            },
            {
              "name": "backupexec-ndmp-gain-access(21793)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
            },
            {
              "name": "1014662",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014662"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2611",
    "datePublished": "2005-08-17T04:00:00",
    "dateReserved": "2005-08-17T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.838Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2080 (GCVE-0-2005-2080)

Vulnerability from nvd – Published: 2005-06-29 04:00 – Updated: 2024-08-07 22:15
VLAI?
Summary
Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:15:37.357Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "14026",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14026"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276608.htm"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-31T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "14026",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14026"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276608.htm"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2080",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "14026",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14026"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276608.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276608.htm"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2080",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-06-29T00:00:00",
    "dateUpdated": "2024-08-07T22:15:37.357Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2079 (GCVE-0-2005-2079)

Vulnerability from nvd – Published: 2005-06-29 04:00 – Updated: 2024-08-07 22:15
VLAI?
Summary
Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://seer.support.veritas.com/docs/276607.htm x_refsource_CONFIRM
http://www.kb.cert.org/vuls/id/352625 third-party-advisoryx_refsource_CERT-VN
http://seer.support.veritas.com/docs/277429.htm x_refsource_CONFIRM
http://www.us-cert.gov/cas/techalerts/TA05-180A.html third-party-advisoryx_refsource_CERT
http://www.securityfocus.com/bid/14023 vdb-entryx_refsource_BID
http://secunia.com/advisories/15789 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:15:37.313Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276607.htm"
          },
          {
            "name": "VU#352625",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/352625"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "name": "TA05-180A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
          },
          {
            "name": "14023",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14023"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-31T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276607.htm"
        },
        {
          "name": "VU#352625",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/352625"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "name": "TA05-180A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
        },
        {
          "name": "14023",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14023"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2079",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://seer.support.veritas.com/docs/276607.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276607.htm"
            },
            {
              "name": "VU#352625",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/352625"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "TA05-180A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
            },
            {
              "name": "14023",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14023"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2079",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-06-29T00:00:00",
    "dateUpdated": "2024-08-07T22:15:37.313Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0771 (GCVE-0-2005-0771)

Vulnerability from nvd – Published: 2005-06-29 04:00 – Updated: 2024-08-07 21:28
VLAI?
Summary
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1014273 vdb-entryx_refsource_SECTRACK
http://www.kb.cert.org/vuls/id/584505 third-party-advisoryx_refsource_CERT-VN
http://www.idefense.com/application/poi/display?i… third-party-advisoryx_refsource_IDEFENSE
http://www.us-cert.gov/cas/techalerts/TA05-180A.html third-party-advisoryx_refsource_CERT
http://secunia.com/advisories/15789 third-party-advisoryx_refsource_SECUNIA
http://seer.support.veritas.com/docs/277429.htm x_refsource_CONFIRM
http://seer.support.veritas.com/docs/276605.htm x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:28.202Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1014273",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014273"
          },
          {
            "name": "VU#584505",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/584505"
          },
          {
            "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
          },
          {
            "name": "TA05-180A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276605.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-15T16:39:34",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1014273",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014273"
        },
        {
          "name": "VU#584505",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/584505"
        },
        {
          "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
        },
        {
          "name": "TA05-180A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276605.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0771",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1014273",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014273"
            },
            {
              "name": "VU#584505",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/584505"
            },
            {
              "name": "20050623 Veritas Backup Exec Server Remote Registry Access Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=269\u0026type=vulnerabilities\u0026flashstatus=true"
            },
            {
              "name": "TA05-180A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276605.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276605.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0771",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-03-18T00:00:00",
    "dateUpdated": "2024-08-07T21:28:28.202Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0773 (GCVE-0-2005-0773)

Vulnerability from nvd – Published: 2005-06-29 04:00 – Updated: 2024-08-07 21:28
VLAI?
Summary
Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.kb.cert.org/vuls/id/492105 third-party-advisoryx_refsource_CERT-VN
http://securitytracker.com/id?1014273 vdb-entryx_refsource_SECTRACK
http://www.osvdb.org/17624 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/14022 vdb-entryx_refsource_BID
http://seer.support.veritas.com/docs/277429.htm x_refsource_CONFIRM
http://seer.support.veritas.com/docs/276604.htm x_refsource_CONFIRM
http://www.idefense.com/application/poi/display?i… third-party-advisoryx_refsource_IDEFENSE
http://www.us-cert.gov/cas/techalerts/TA05-180A.html third-party-advisoryx_refsource_CERT
http://secunia.com/advisories/15789 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:28.409Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#492105",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/492105"
          },
          {
            "name": "1014273",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014273"
          },
          {
            "name": "17624",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/17624"
          },
          {
            "name": "14022",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14022"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/277429.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276604.htm"
          },
          {
            "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
          },
          {
            "name": "TA05-180A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-14T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#492105",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/492105"
        },
        {
          "name": "1014273",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014273"
        },
        {
          "name": "17624",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/17624"
        },
        {
          "name": "14022",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14022"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/277429.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276604.htm"
        },
        {
          "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
        },
        {
          "name": "TA05-180A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0773",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#492105",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/492105"
            },
            {
              "name": "1014273",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014273"
            },
            {
              "name": "17624",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/17624"
            },
            {
              "name": "14022",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14022"
            },
            {
              "name": "http://seer.support.veritas.com/docs/277429.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/277429.htm"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276604.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276604.htm"
            },
            {
              "name": "20050623 Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=272\u0026type=vulnerabilities\u0026flashstatus=true"
            },
            {
              "name": "TA05-180A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-180A.html"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0773",
    "datePublished": "2005-06-29T04:00:00",
    "dateReserved": "2005-03-18T00:00:00",
    "dateUpdated": "2024-08-07T21:28:28.409Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2051 (GCVE-0-2005-2051)

Vulnerability from nvd – Published: 2005-06-26 04:00 – Updated: 2024-08-07 22:15
VLAI?
Summary
Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.ciac.org/ciac/bulletins/p-232.shtml third-party-advisorygovernment-resourcex_refsource_CIAC
http://www.securityfocus.com/bid/14025 vdb-entryx_refsource_BID
http://seer.support.veritas.com/docs/276606.htm x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=111954711532252&w=2 mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/15789 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:15:36.839Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "P-232",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
          },
          {
            "name": "14025",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14025"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/276606.htm"
          },
          {
            "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
          },
          {
            "name": "15789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15789"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "P-232",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
        },
        {
          "name": "14025",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14025"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/276606.htm"
        },
        {
          "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
        },
        {
          "name": "15789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15789"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2051",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "P-232",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/p-232.shtml"
            },
            {
              "name": "14025",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14025"
            },
            {
              "name": "http://seer.support.veritas.com/docs/276606.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/276606.htm"
            },
            {
              "name": "20050623 Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=111954711532252\u0026w=2"
            },
            {
              "name": "15789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15789"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2051",
    "datePublished": "2005-06-26T04:00:00",
    "dateReserved": "2005-06-26T00:00:00",
    "dateUpdated": "2024-08-07T22:15:36.839Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-1172 (GCVE-0-2004-1172)

Vulnerability from nvd – Published: 2004-12-22 05:00 – Updated: 2024-08-08 00:39
VLAI?
Summary
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:39:01.126Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273419.htm"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
          },
          {
            "name": "11974",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11974"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273850.htm"
          },
          {
            "name": "VU#907729",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/907729"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273422.htm"
          },
          {
            "name": "13495",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13495/"
          },
          {
            "name": "netbackup-agent-browser-bo(18506)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.support.veritas.com/docs/273420.htm"
          },
          {
            "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=169"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273419.htm"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
        },
        {
          "name": "11974",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11974"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273850.htm"
        },
        {
          "name": "VU#907729",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/907729"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273422.htm"
        },
        {
          "name": "13495",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13495/"
        },
        {
          "name": "netbackup-agent-browser-bo(18506)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.support.veritas.com/docs/273420.htm"
        },
        {
          "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=169"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1172",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://seer.support.veritas.com/docs/273419.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273419.htm"
            },
            {
              "name": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php",
              "refsource": "MISC",
              "url": "http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php"
            },
            {
              "name": "11974",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11974"
            },
            {
              "name": "http://seer.support.veritas.com/docs/273850.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273850.htm"
            },
            {
              "name": "VU#907729",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/907729"
            },
            {
              "name": "http://seer.support.veritas.com/docs/273422.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273422.htm"
            },
            {
              "name": "13495",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13495/"
            },
            {
              "name": "netbackup-agent-browser-bo(18506)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18506"
            },
            {
              "name": "http://seer.support.veritas.com/docs/273420.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.support.veritas.com/docs/273420.htm"
            },
            {
              "name": "20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=169"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1172",
    "datePublished": "2004-12-22T05:00:00",
    "dateReserved": "2004-12-13T00:00:00",
    "dateUpdated": "2024-08-08T00:39:01.126Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}