lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <43FB1967D03EC7449A77FA91322E364802540780@SVL1XCHCLUPIN01.enterprise.veritas.com>
Date: Wed, 16 Aug 2006 12:57:17 -0700
From: "Mike Prosser" <mprosser@...antec.com>
To: <bugtraq@...urityfocus.com>
Subject: SYM06-16 Symantec NetBackup PureDisk Remote Office Edition Elevation of Privilege

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Symantec Security Advisory

SYM06-015

16 August 2006 

Symantec NetBackup PureDisk:  Non-Privileged User Authentication Bypass
Elevation of Privilege

Revision History
None 

Severity
Medium (highly dependent on network configuration) 

Remote Access
Yes
Local Access
No
Authentication Required
Yes (to network) 
Exploit publicly available
No

Overview
Symantec discovered a security issue in Symantec's Veritas NetBackup 6.0
PureDisk Remote Office Edition. An unauthorized user with access to the
network and the
server hosting the management interface can potentially bypass the
management interface
authentication to gain access and elevate their privileges on the
system.

Supported Product(s) Affected 
Product:  Symantec Veritas NetBackup PureDisk Remote 
Office Edition (all platforms)
Version: 6.0
Builds: GA, MP1
Solution: NB_PDE_60_MP1_P01

NOTE: For systems running NetBackup 6.0 GA PureDisk Remote Office
Edition
it will be necessary to install Maintenance Pack 1  prior to applying
this
Security
Pack.
This issue ONLY affects the product and versions listed above. 
 
Details
An internal review revealed a potential elevation of privilege issue in
the
Symantec Veritas NetBackup PureDisk management interface.  The
management
interface is
accessible only through an SSL web connection by default.  However it is
possible for a
non-privileged user with access to the network and the server hosting
the
Symantec Veritas NetBackup
PureDisk management interface, to bypass the management interface
authentication and
further leverage their access to elevate privileged access on the
server.

Symantec Response
Symantec engineers have addressed the issues identified above and made
Security updates available.
Symantec strongly recommends all customers apply the latest security
update
to protect against threats of this nature.
Symantec knows of no exploitation of or adverse customer impact from
these
issues.


The patches listed above for affected products are available through the
following location: 
 http://support.veritas.com/docs/284734 for Symantec Veritas NetBackup
PureDisk Remote Office Edition.

Best Practices 
As part of normal best practices, Symantec recommends: 
- - - Restrict access to administration or management systems to
authorized
privileged users only
- - - Block remote access to all ports not essential for efficient
operation
- - - Restrict remote access, if required, to trusted/authorized systems
only
- - - Remove/disable unnecessary accounts or restrict access according
to
security policy as required 
- - - Run under the principle of least privilege where possible
- - - Keep all operating systems and applications updated with the
latest
vendor patches 
- - - Follow a multi-layered approach to security. Run both firewall and
antivirus applications, at a minimum, to provide multiple points of
detection and protection to
both inbound and outbound threats 
- - - Deploy network intrusion detection systems to monitor network
traffic
for
signs of anomalous or suspicious activity. This may aid in detection of
attacks or
Malicious activity related to exploitation of latest vulnerabilities

CVE 
A CVE Candidate name is being requested from the Common Vulnerabilities
and
Exposures(CVE) initiative for this issue. This advisory will be revised
accordingly
upon receipt of the CVE Candidate name.
This issue is a candidate for inclusion in the CVE list
(http://cve.mitre.org), which standardizesnames for security problems. 

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)

iQEVAwUBRON4lRy6+gFWHby+AQigiwgAwk0k8rQhhhC9lRiTuHm+sSjPCoLHRSH/
OkR2WNZxSMP3z4AkYeJ7r/h465diPIdnkwAK9Q7pWpberooK2ffF2e5QpgIGLvB+
GoyyZddrAoKdix8wcQj9bgix+W+OiD93Bmh1q/iSBdFgJ6IvQNzEwdqLr2LXkG+W
clz7Asv8LOn6p2kPACDQOKNGMJvlQD8csdRRo+bNUtjv8FGiZB7Q+NXKjlZa5JRB
+ZlXWKfrlY5mjREcd7cTumif88wG7B4vc6Be0aPI0bGnICLdTT+xCwnKaGVLR+0i
QucuAn5xJDn6of2HZ4IuGfKgTpdtO5uYIta5xRKhWew2r+1MjM5rTw==
=sQoe
-----END PGP SIGNATURE-----

View attachment "SYM06-015_signed.txt" of type "text/plain" (4160 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ