Advisory Details

December 13th, 2006

Symantec Veritas NetBackup CONNECT_OPTIONS Buffer Overflow Vulnerability

ZDI-06-050
ZDI-CAN-071

CVE ID CVE-2006-5822
CVSS SCORE
AFFECTED VENDORS Symantec
AFFECTED PRODUCTS Veritas NetBackup
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['4506']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Symantec Veritas NetBackup. Authentication is not required to exploit this vulnerability.

The specific flaw exists within bpcd.exe during the parsing of overly long CONNECT_OPTIONS requests to a NetBackup Master/Media Server. When the CONNECT_OPTIONS command is parsed, the contents are copied into a stack allocated buffer without proper length checking. Exploitation of this vulnerability can lead to complete system compromise.

ADDITIONAL DETAILS Symantec has issued an update to correct this vulnerability. More details can be found at:
http://www.symantec.com/avcenter/security/Content/2006.12.13a.html
DISCLOSURE TIMELINE
  • 2006-08-14 - Vulnerability reported to vendor
  • 2006-12-13 - Coordinated public release of advisory
CREDIT Sebastian Apelt
BACK TO ADVISORIES