Veritas Backup Exec Agent Browser 8.x < 8.60.3878 HF 68 / 9.0.x < 9.0.4454 HF 30 / 9.1.x < 9.1.4691 HF 40 RCE

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by a remote code execution vulnerability.

Description :

The version of Veritas Backup Exec Agent Browser installed on the
remote host is 8.x prior to 8.60.3878 hotfix 68, 9.0.x prior to
9.0.4454 hotfix 30, or 9.1.x prior to 9.1.4691 hotfix 40. It is,
therefore, affected by a remote code execution vulnerability in the
registration service (benetns.exe) due to a failure to validate the
client hostname field during the registration process. An
unauthenticated, remote attacker can exploit this, via a specially
crafted request, to cause a stack-based buffer overflow, resulting in
the execution of arbitrary code.

See also :

http://www.nessus.org/u?191bec81
http://www.nessus.org/u?7aa777ec
http://www.nessus.org/u?f0e640a0
http://www.nessus.org/u?03ad9b52

Solution :

Upgrade to Veritas Backup Exec Agent Browser 8.60.3878 hotfix 68 /
9.0.4454 hotfix 30 / 9.1.4691 hotfix 40 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 16230 ()

Bugtraq ID: 11974

CVE ID: CVE-2004-1172

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now