Search criteria
6 vulnerabilities found for netbackup by symantec_veritas
CVE-2005-3116 (GCVE-0-2005-3116)
Vulnerability from cvelistv5 – Published: 2005-11-18 11:00 – Updated: 2024-08-07 23:01
VLAI?
Summary
Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:01:57.825Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#574662",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/574662"
},
{
"name": "20674",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/20674"
},
{
"name": "20060115 Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded"
},
{
"name": "15353",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15353"
},
{
"name": "20051110 Stack Overflow in Veritas Netbackup Enterprise Server",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE",
"x_transferred"
],
"url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities"
},
{
"name": "1015170",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015170"
},
{
"name": "17503",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17503"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html"
},
{
"name": "20060117 Re: Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded"
},
{
"name": "netbackup-vmd-bo(22985)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985"
},
{
"name": "ADV-2005-2349",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2349"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://seer.support.veritas.com/docs/279553.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-11-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "VU#574662",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/574662"
},
{
"name": "20674",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/20674"
},
{
"name": "20060115 Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded"
},
{
"name": "15353",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15353"
},
{
"name": "20051110 Stack Overflow in Veritas Netbackup Enterprise Server",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE"
],
"url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities"
},
{
"name": "1015170",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015170"
},
{
"name": "17503",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17503"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html"
},
{
"name": "20060117 Re: Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded"
},
{
"name": "netbackup-vmd-bo(22985)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985"
},
{
"name": "ADV-2005-2349",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2349"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://seer.support.veritas.com/docs/279553.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-3116",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#574662",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/574662"
},
{
"name": "20674",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/20674"
},
{
"name": "20060115 Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded"
},
{
"name": "15353",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15353"
},
{
"name": "20051110 Stack Overflow in Veritas Netbackup Enterprise Server",
"refsource": "IDEFENSE",
"url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities"
},
{
"name": "1015170",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015170"
},
{
"name": "17503",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17503"
},
{
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html",
"refsource": "CONFIRM",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html"
},
{
"name": "20060117 Re: Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded"
},
{
"name": "netbackup-vmd-bo(22985)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985"
},
{
"name": "ADV-2005-2349",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2349"
},
{
"name": "http://seer.support.veritas.com/docs/279553.htm",
"refsource": "CONFIRM",
"url": "http://seer.support.veritas.com/docs/279553.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-3116",
"datePublished": "2005-11-18T11:00:00",
"dateReserved": "2005-09-30T00:00:00",
"dateUpdated": "2024-08-07T23:01:57.825Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-2611 (GCVE-0-2005-2611)
Vulnerability from cvelistv5 – Published: 2005-08-17 04:00 – Updated: 2024-08-07 22:30
VLAI?
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:30:01.838Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "TA05-224A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
},
{
"name": "14551",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/14551"
},
{
"name": "16403",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/16403"
},
{
"name": "VU#378957",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/378957"
},
{
"name": "ADV-2005-1387",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/1387"
},
{
"name": "backupexec-ndmp-gain-access(21793)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
},
{
"name": "1014662",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1014662"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-08-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "TA05-224A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
},
{
"name": "14551",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/14551"
},
{
"name": "16403",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/16403"
},
{
"name": "VU#378957",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/378957"
},
{
"name": "ADV-2005-1387",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/1387"
},
{
"name": "backupexec-ndmp-gain-access(21793)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
},
{
"name": "1014662",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1014662"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-2611",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "TA05-224A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
},
{
"name": "14551",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14551"
},
{
"name": "16403",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16403"
},
{
"name": "VU#378957",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/378957"
},
{
"name": "ADV-2005-1387",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/1387"
},
{
"name": "backupexec-ndmp-gain-access(21793)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
},
{
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html",
"refsource": "CONFIRM",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
},
{
"name": "1014662",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014662"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-2611",
"datePublished": "2005-08-17T04:00:00",
"dateReserved": "2005-08-17T00:00:00",
"dateUpdated": "2024-08-07T22:30:01.838Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-3116 (GCVE-0-2005-3116)
Vulnerability from nvd – Published: 2005-11-18 11:00 – Updated: 2024-08-07 23:01
VLAI?
Summary
Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:01:57.825Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#574662",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/574662"
},
{
"name": "20674",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/20674"
},
{
"name": "20060115 Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded"
},
{
"name": "15353",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15353"
},
{
"name": "20051110 Stack Overflow in Veritas Netbackup Enterprise Server",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE",
"x_transferred"
],
"url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities"
},
{
"name": "1015170",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015170"
},
{
"name": "17503",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17503"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html"
},
{
"name": "20060117 Re: Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded"
},
{
"name": "netbackup-vmd-bo(22985)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985"
},
{
"name": "ADV-2005-2349",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2349"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://seer.support.veritas.com/docs/279553.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-11-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "VU#574662",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/574662"
},
{
"name": "20674",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/20674"
},
{
"name": "20060115 Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded"
},
{
"name": "15353",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15353"
},
{
"name": "20051110 Stack Overflow in Veritas Netbackup Enterprise Server",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE"
],
"url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities"
},
{
"name": "1015170",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015170"
},
{
"name": "17503",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17503"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html"
},
{
"name": "20060117 Re: Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded"
},
{
"name": "netbackup-vmd-bo(22985)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985"
},
{
"name": "ADV-2005-2349",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2349"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://seer.support.veritas.com/docs/279553.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-3116",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#574662",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/574662"
},
{
"name": "20674",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/20674"
},
{
"name": "20060115 Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded"
},
{
"name": "15353",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15353"
},
{
"name": "20051110 Stack Overflow in Veritas Netbackup Enterprise Server",
"refsource": "IDEFENSE",
"url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities"
},
{
"name": "1015170",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015170"
},
{
"name": "17503",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17503"
},
{
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html",
"refsource": "CONFIRM",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html"
},
{
"name": "20060117 Re: Veritas NetBackup \"Volume Manager Daemon\" Module Stack Overflow - Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded"
},
{
"name": "netbackup-vmd-bo(22985)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985"
},
{
"name": "ADV-2005-2349",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2349"
},
{
"name": "http://seer.support.veritas.com/docs/279553.htm",
"refsource": "CONFIRM",
"url": "http://seer.support.veritas.com/docs/279553.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-3116",
"datePublished": "2005-11-18T11:00:00",
"dateReserved": "2005-09-30T00:00:00",
"dateUpdated": "2024-08-07T23:01:57.825Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-2611 (GCVE-0-2005-2611)
Vulnerability from nvd – Published: 2005-08-17 04:00 – Updated: 2024-08-07 22:30
VLAI?
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:30:01.838Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "TA05-224A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
},
{
"name": "14551",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/14551"
},
{
"name": "16403",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/16403"
},
{
"name": "VU#378957",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/378957"
},
{
"name": "ADV-2005-1387",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/1387"
},
{
"name": "backupexec-ndmp-gain-access(21793)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
},
{
"name": "1014662",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1014662"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-08-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "TA05-224A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
},
{
"name": "14551",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/14551"
},
{
"name": "16403",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/16403"
},
{
"name": "VU#378957",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/378957"
},
{
"name": "ADV-2005-1387",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/1387"
},
{
"name": "backupexec-ndmp-gain-access(21793)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
},
{
"name": "1014662",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1014662"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-2611",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "TA05-224A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
},
{
"name": "14551",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14551"
},
{
"name": "16403",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16403"
},
{
"name": "VU#378957",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/378957"
},
{
"name": "ADV-2005-1387",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/1387"
},
{
"name": "backupexec-ndmp-gain-access(21793)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
},
{
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html",
"refsource": "CONFIRM",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
},
{
"name": "1014662",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014662"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-2611",
"datePublished": "2005-08-17T04:00:00",
"dateReserved": "2005-08-17T00:00:00",
"dateUpdated": "2024-08-07T22:30:01.838Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2005-3116
Vulnerability from fkie_nvd - Published: 2005-11-18 06:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| symantec_veritas | netbackup | 5.0_with_mp1 | |
| symantec_veritas | netbackup | 5.0_with_mp2 | |
| symantec_veritas | netbackup | 5.0_with_mp3 | |
| symantec_veritas | netbackup | 5.0_with_mp4 | |
| symantec_veritas | netbackup | 5.0_with_mp5 | |
| symantec_veritas | netbackup | 5.1_with_mp1 | |
| symantec_veritas | netbackup | 5.1_with_mp2 | |
| symantec_veritas | netbackup | 5.1_with_mp3a | |
| symantec_veritas | netbackup | 5.1_without_mp |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.0_with_mp1:*:*:*:*:*:*:*",
"matchCriteriaId": "54C2D4E7-E69F-4856-9A55-A0CE2E7A0EB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.0_with_mp2:*:*:*:*:*:*:*",
"matchCriteriaId": "4772C897-31EF-40D9-A06B-0069800E8555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.0_with_mp3:*:*:*:*:*:*:*",
"matchCriteriaId": "92FCDA77-5438-416C-AA74-2805236D6873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.0_with_mp4:*:*:*:*:*:*:*",
"matchCriteriaId": "8202F4F2-20D2-4F9C-AF48-4ECF3679C867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.0_with_mp5:*:*:*:*:*:*:*",
"matchCriteriaId": "79BA195E-9AB8-4735-9C98-6A4512C035F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.1_with_mp1:*:*:*:*:*:*:*",
"matchCriteriaId": "F065C70A-EB65-4409-B237-D1B17C721DFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.1_with_mp2:*:*:*:*:*:*:*",
"matchCriteriaId": "90673C92-DDE7-43BB-BE1C-D9A0A3B52AEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.1_with_mp3a:*:*:*:*:*:*:*",
"matchCriteriaId": "15966A96-F374-4CF0-ACE1-4D90DCDA0E0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:5.1_without_mp:*:*:*:*:*:*:*",
"matchCriteriaId": "C7CB7DE9-3089-4DC0-9BC4-BF9CFD345061",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet."
}
],
"evaluatorSolution": "Failed exploit attempts may result in a denial-of-service condition.",
"id": "CVE-2005-3116",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-11-18T06:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17503"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1015170"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://seer.support.veritas.com/docs/279553.htm"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/574662"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.osvdb.org/20674"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/15353"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2005/2349"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17503"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1015170"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://seer.support.veritas.com/docs/279553.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.idefense.com/application/poi/display?id=336\u0026type=vulnerabilities"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/574662"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.osvdb.org/20674"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/422066/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/422157/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/15353"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2005/2349"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22985"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-2611
Vulnerability from fkie_nvd - Published: 2005-08-17 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| symantec_veritas | backup_exec | netware_servers_9.0.4019 | |
| symantec_veritas | backup_exec | netware_servers_9.0.4170 | |
| symantec_veritas | backup_exec | netware_servers_9.0.4172 | |
| symantec_veritas | backup_exec | netware_servers_9.0.4174 | |
| symantec_veritas | backup_exec | netware_servers_9.0.4202 | |
| symantec_veritas | backup_exec | netware_servers_9.1.306 | |
| symantec_veritas | backup_exec | netware_servers_9.1.307 | |
| symantec_veritas | backup_exec | netware_servers_9.1.1067_.2 | |
| symantec_veritas | backup_exec | netware_servers_9.1.1067_.3 | |
| symantec_veritas | backup_exec | netware_servers_9.1.1127_.1 | |
| symantec_veritas | backup_exec | netware_servers_9.1.1151_.1 | |
| symantec_veritas | backup_exec | netware_servers_9.1.1152 | |
| symantec_veritas | backup_exec | netware_servers_9.1.1152_.4 | |
| symantec_veritas | backup_exec | netware_servers_9.1.1154 | |
| symantec_veritas | backup_exec | netware_servers_9.1.1156 | |
| symantec_veritas | backup_exec | windows_servers_8.6 | |
| symantec_veritas | backup_exec | windows_servers_9.0 | |
| symantec_veritas | backup_exec | windows_servers_9.0_rev._4367 | |
| symantec_veritas | backup_exec | windows_servers_9.0_rev._4367_sp1 | |
| symantec_veritas | backup_exec | windows_servers_9.0_rev._4454 | |
| symantec_veritas | backup_exec | windows_servers_9.0_rev._4454_sp1 | |
| symantec_veritas | backup_exec | windows_servers_9.1 | |
| symantec_veritas | backup_exec | windows_servers_9.1_rev._4691 | |
| symantec_veritas | backup_exec | windows_servers_9.1_rev._4691_sp2 | |
| symantec_veritas | backup_exec | windows_servers_10.0_rev._5484 | |
| symantec_veritas | backup_exec | windows_servers_10.0_rev._5484_sp1 | |
| symantec_veritas | backup_exec | windows_servers_10.0_rev._5520 | |
| symantec_veritas | backup_exec_remote_agent | netware_server | |
| symantec_veritas | backup_exec_remote_agent | unix_linux_server | |
| symantec_veritas | backup_exec_remote_agent | windows_server | |
| symantec_veritas | netbackup | netware_media_servers_4.5 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_fp1 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_fp2 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_fp3 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_fp4 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_fp5 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_fp6 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_fp7 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_fp8 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_mp1 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_mp2 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_mp3 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_mp4 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_mp5 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_mp6 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_mp7 | |
| symantec_veritas | netbackup | netware_media_servers_4.5_mp8 | |
| symantec_veritas | netbackup | netware_media_servers_5.0 | |
| symantec_veritas | netbackup | netware_media_servers_5.0_mp1 | |
| symantec_veritas | netbackup | netware_media_servers_5.0_mp2 | |
| symantec_veritas | netbackup | netware_media_servers_5.0_mp3 | |
| symantec_veritas | netbackup | netware_media_servers_5.0_mp4 | |
| symantec_veritas | netbackup | netware_media_servers_5.0_mp5 | |
| symantec_veritas | netbackup | netware_media_servers_5.1 | |
| symantec_veritas | netbackup | netware_media_servers_5.1_mp1 | |
| symantec_veritas | netbackup | netware_media_servers_5.1_mp2 | |
| symantec_veritas | netbackup | netware_media_servers_5.1_mp3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4019:*:*:*:*:*:*:*",
"matchCriteriaId": "C24230F6-26C4-4A09-BEB0-BF4E5B8A83F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4170:*:*:*:*:*:*:*",
"matchCriteriaId": "A49730A7-4C5B-4130-A194-63BCB0C0DB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4172:*:*:*:*:*:*:*",
"matchCriteriaId": "9247F741-16D7-40B3-9037-326270AE1A68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4174:*:*:*:*:*:*:*",
"matchCriteriaId": "BEBFD68D-E56E-4B95-AA70-CA2FC371AF2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4202:*:*:*:*:*:*:*",
"matchCriteriaId": "44B5CC50-7D43-493F-8DD5-56807CFFB56C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.306:*:*:*:*:*:*:*",
"matchCriteriaId": "2A59088D-B16C-4508-8594-4F9A66702914",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.307:*:*:*:*:*:*:*",
"matchCriteriaId": "D6B20BEF-0D8F-412E-8AE3-9D660BF89C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DA7C5BF9-5780-435D-9F42-5F2712A9C612",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.3:*:*:*:*:*:*:*",
"matchCriteriaId": "17278449-4647-418C-A43F-980EDCE47E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1127_.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EC8908-5A6E-4BE7-9AB6-A96E331392F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1151_.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE7C8D6-CCFF-4C67-BD53-12519510A904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152:*:*:*:*:*:*:*",
"matchCriteriaId": "86CD25F2-2F58-4468-9898-15CE0701BBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152_.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB00211-2397-4444-B8E2-FD05344FE05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1154:*:*:*:*:*:*:*",
"matchCriteriaId": "58ED7E29-8BFA-460F-B2C9-651DF9D31D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1156:*:*:*:*:*:*:*",
"matchCriteriaId": "8DEFCF58-B287-4299-92FE-5077A52ADFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C6375C88-EF6D-44E5-8445-788FB8B8DCDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C778849-F5FE-4C4D-BED3-B4E59D18E5B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367:*:*:*:*:*:*:*",
"matchCriteriaId": "E034329F-003A-4A76-9146-8C3A216DEDD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4367_sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "724349E3-8152-4FF3-8617-6399B13B5332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454:*:*:*:*:*:*:*",
"matchCriteriaId": "66BA959E-A95D-4828-9FE5-7A5D82627A5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.0_rev._4454_sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "F02B3EF2-1327-4138-B8E1-BEFEAABC4066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BF573CC6-E3A5-49A0-9D64-C7D82EE87903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691:*:*:*:*:*:*:*",
"matchCriteriaId": "30AB7137-F41A-420F-9C01-FBB3E012CDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_9.1_rev._4691_sp2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FDD5FDA-B5D4-4C93-A83E-3B7A1B89F02D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484:*:*:*:*:*:*:*",
"matchCriteriaId": "11E65B29-5535-4818-ADF9-0E880AE152FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5484_sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "EBBC7B82-58F9-4D75-B910-5287B7FA3720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:windows_servers_10.0_rev._5520:*:*:*:*:*:*:*",
"matchCriteriaId": "46AD7EE2-DA3A-4877-B29D-71650B255061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:netware_server:*:*:*:*:*:*:*",
"matchCriteriaId": "A4823F99-C0BA-43E1-AA7F-E35415D6C279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:unix_linux_server:*:*:*:*:*:*:*",
"matchCriteriaId": "19977C9B-BD6C-45A4-AB33-31C7BB00782D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec_remote_agent:windows_server:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE4468B-241C-4F20-BC43-5A24F187014A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C5081924-EAEB-4BAC-A6A9-A23587654D6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B4EC4ED-AD7A-4D07-B105-D8BC11267942",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8A41C7-1AB9-443D-BB23-F31144DFAFD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp3:*:*:*:*:*:*:*",
"matchCriteriaId": "D0D5585D-CBC1-4209-A990-33DCE08BD10D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp4:*:*:*:*:*:*:*",
"matchCriteriaId": "D927248C-CD93-4266-8018-06546BDE0F46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4076FB-45BD-46B8-AAB7-B46EA7901C28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3593F48-41BF-44E2-B91C-BA2A895FB100",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp7:*:*:*:*:*:*:*",
"matchCriteriaId": "616B1E3A-D14E-4C88-BA71-84C060A13A3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_fp8:*:*:*:*:*:*:*",
"matchCriteriaId": "F3F86FDE-00EF-4166-B079-E0E69DD90A61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6CE835-E847-4ED5-A8BC-1F5B363D057F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp2:*:*:*:*:*:*:*",
"matchCriteriaId": "DF1CD6F4-BC8B-45DE-A978-1537E3A87689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp3:*:*:*:*:*:*:*",
"matchCriteriaId": "69CBF588-B9FB-463B-BEE2-AC6D841EE81D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp4:*:*:*:*:*:*:*",
"matchCriteriaId": "F638B809-E7E7-49FD-8CFE-08595B287D83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp5:*:*:*:*:*:*:*",
"matchCriteriaId": "CBD1DB09-DCC8-43DA-A27F-5388716FF013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp6:*:*:*:*:*:*:*",
"matchCriteriaId": "242E0063-43B4-4ADD-AB51-E4491509F83B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp7:*:*:*:*:*:*:*",
"matchCriteriaId": "951B5532-C019-4B80-94A8-61DE2D084589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_4.5_mp8:*:*:*:*:*:*:*",
"matchCriteriaId": "F658FB82-5BF8-437E-BABA-14FFCDE3332F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D5E1821-A0D8-42CC-B0EF-A4C7EAB6D173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp1:*:*:*:*:*:*:*",
"matchCriteriaId": "F04483F1-F206-4693-870F-84FFA310F6DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D342EB5-8DA1-4573-9EA3-210C94A883E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp3:*:*:*:*:*:*:*",
"matchCriteriaId": "56E9E8E6-E6B9-42E4-BF40-8CC402A7AF05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp4:*:*:*:*:*:*:*",
"matchCriteriaId": "15F114D1-1D7B-41C3-A735-6F60C7B41460",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.0_mp5:*:*:*:*:*:*:*",
"matchCriteriaId": "D74B8A14-1CD5-49C1-AF30-AE37796C9030",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE510737-B5FD-4B10-8062-AB90A57F3958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp1:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1E8843-29A8-41EB-8689-C5E02791E8D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp2:*:*:*:*:*:*:*",
"matchCriteriaId": "CA48FEAB-AD82-4648-AC9E-B2C72AA27BAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec_veritas:netbackup:netware_media_servers_5.1_mp3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB12220-726E-4B32-BEEF-63B2E450F4D7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server."
}
],
"id": "CVE-2005-2611",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-08-17T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/16403"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1014662"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/378957"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/14551"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2005/1387"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/16403"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1014662"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/378957"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/14551"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA05-224A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2005/1387"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21793"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}