lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060320204245.19786.qmail@securityfocus.com>
Date: 20 Mar 2006 20:42:45 -0000
From: secure@...antec.com
To: bugtraq@...urityfocus.com
Subject: Symantec Security Advisory, SYM06-005


Symantec Security Advisory
SYM06-005
17 March 2006 

Veritas Backup Exec for Windows Servers: Media Server BENGINE Service Job
log Format String Overflow

Revision History
None 

Severity
Low (network/system authorization and specific configuration required)

Remote Access Yes
Local Access No 
Authentication Required Yes 
Exploit publicly available No  

Overview
Backup Exec for Windows Servers Media Server is susceptible to a format string vulnerability in the job log in BENGINE.exe when job logging is
configured with full details enabled. (Not the default configuration)
An authorized user on the network with a system configured for backup could potentially host a specifically-formatted file on their system. If the file name is properly mal-formatted AND the backup is being run with job logs enabled in Full Details mode, the malicious user could cause a denial of service on the Media Server or may potentially be able to run arbitrary code on the system hosting the Media Server.

Full Advisory available @
http://www.symantec.com/avcenter/security/Content/2006.03.17b.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ