[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060320204245.19786.qmail@securityfocus.com>
Date: 20 Mar 2006 20:42:45 -0000
From: secure@...antec.com
To: bugtraq@...urityfocus.com
Subject: Symantec Security Advisory, SYM06-005
Symantec Security Advisory
SYM06-005
17 March 2006
Veritas Backup Exec for Windows Servers: Media Server BENGINE Service Job
log Format String Overflow
Revision History
None
Severity
Low (network/system authorization and specific configuration required)
Remote Access Yes
Local Access No
Authentication Required Yes
Exploit publicly available No
Overview
Backup Exec for Windows Servers Media Server is susceptible to a format string vulnerability in the job log in BENGINE.exe when job logging is
configured with full details enabled. (Not the default configuration)
An authorized user on the network with a system configured for backup could potentially host a specifically-formatted file on their system. If the file name is properly mal-formatted AND the backup is being run with job logs enabled in Full Details mode, the malicious user could cause a denial of service on the Media Server or may potentially be able to run arbitrary code on the system hosting the Media Server.
Full Advisory available @
http://www.symantec.com/avcenter/security/Content/2006.03.17b.html
Powered by blists - more mailing lists