Penetration Testing mailing list archives

Re: Vulnerability Scanner for Backup servers


From: securityfocus () frij com
Date: 3 Aug 2005 02:51:06 -0000

Here are some links, appreciat any help anyone else could provide.

http://www.securityfocus.com/bid/14020  Veritas Backup Exec Server Remote Registry Access Vulnerability 
http://www.securityfocus.com/bid/14019  Veritas Backup Exec/NetBackup Request Packet Denial Of Service Vulnerability 
http://www.securityfocus.com/bid/14021  Veritas Backup Exec Remote Agent Null Pointer Dereference Denial Of Service 
Vulnerabilit 
http://www.securityfocus.com/bid/14022  Veritas Backup Exec Remote Agent for Windows Servers Authentication Buffer 
Overflow Vulnerability 
http://www.securityfocus.com/bid/14023  Veritas Backup Exec Admin Plus Pack Option Remote Heap Overflow Vulnerability 
http://www.securityfocus.com/bid/14025  Veritas Backup Exec Web Administration Console Remote Buffer Overflow 
Vulnerability
http://www.securityfocus.com/bid/14026  Veritas Backup Exec Remote Agent for Windows Servers Privilege Escalation 
Vulnerability 
http://www.securityfocus.com/bid/14355  Veritas NetBackup and Backup Exec Access Violation Vulnerability 
http://www.securityfocus.com/archive/1/407098/30/0/threaded CA BrightStor ARCserve/Enterprise Backup Agents buffer 
overflow vulnerability

These are very new vulnerabilities but a few have been rumoured to be actively exploited in the wild.

Cheers


------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't

Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:

http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------


Current thread: