Vulnwatch mailing list archives
Veritas BackupExec Agent vulnerability
From: Brad Zimmerman <exocet () exocet ca>
Date: Fri, 17 Dec 2004 07:05:13 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 http://isc.sans.org/ [The following text was taken directly from the isc.sans.org site. I did not discover this vulnerability and I'm not taking any credit for it. Simply haven't seen this on the Vulnwach list.] "A remote vulnerability in Veritas BackupExec Agent has been discovered. This vulnerability is especially serious as it does not require any authentication before the service can be exploited, and by their very nature, backup servers tend to both be reachable by, and have access to, a large number of systems within an organization. If you run BackupExec, patches are available for both Version 8.6.x http://seer.support.veritas.com/docs/273422.htm and Version 9.1.x http://seer.support.veritas.com/docs/273420.htm" - -- Sent via the web's best browser/email client - Mozilla v1.7.3 Verify my PGP signature! Was it I or an imposter who sent this email? PGP Key: BAA7260D FP: 3F87 632E 2513 06E3 D7EE 1C94 ACAD 1187 BAA7 260D See my PGP FP/key at: http://exocet.ca and http://slashdot.org/~Exocet -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFBwvWorK0Rh7qnJg0RAkd0AKCijlJAKQOHW4is6kO0nuYxQYb4vwCfVVEb SA052q6acCEsK+xYiRUHHB4= =9jWc -----END PGP SIGNATURE-----
Current thread:
- Veritas BackupExec Agent vulnerability Brad Zimmerman (Dec 17)