Veritas Backup Exec Agent Browser 8.x < 8.60.3878 HF 68 / 9.0.x < 9.0.4454 HF 30 / 9.1.x < 9.1.4691 HF 40 RCE

Critical Nessus Plugin ID 16230


The remote host is affected by a remote code execution vulnerability.


The version of Veritas Backup Exec Agent Browser installed on the remote host is 8.x prior to 8.60.3878 hotfix 68, 9.0.x prior to 9.0.4454 hotfix 30, or 9.1.x prior to 9.1.4691 hotfix 40. It is, therefore, affected by a remote code execution vulnerability in the registration service (benetns.exe) due to a failure to validate the client hostname field during the registration process. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to cause a stack-based buffer overflow, resulting in the execution of arbitrary code.


Upgrade to Veritas Backup Exec Agent Browser 8.60.3878 hotfix 68 / 9.0.4454 hotfix 30 / 9.1.4691 hotfix 40 or later.

See Also

Plugin Details

Severity: Critical

ID: 16230

File Name: veritas_backup_exec_overflow.nasl

Version: $Revision: 1.26 $

Type: local

Agent: windows

Family: Windows

Published: 2005/01/24

Modified: 2016/11/29

Dependencies: 13855

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:symantec:veritas_backup_exec, cpe:/a:symantec_veritas:backup_exec

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2005/02/08

Vulnerability Publication Date: 2004/12/16

Exploitable With

Core Impact

Metasploit (Veritas Backup Exec Name Service Overflow)

Reference Information

CVE: CVE-2004-1172

BID: 11974

OSVDB: 12418

EDB-ID: 750

CERT: 907729