Vulnerabilities > CVE-2004-1172 - Remote Buffer Overflow vulnerability in VERITAS Backup Exec Agent Browser

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
symantec-veritas
critical
nessus
exploit available
metasploit

Summary

Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.

Exploit-Db

  • descriptionVeritas Backup Exec Agent 8.x/9.x Browser Overflow (c version). CVE-2004-1172. Remote exploit for windows platform
    idEDB-ID:750
    last seen2016-01-31
    modified2005-01-11
    published2005-01-11
    reporterclass101
    sourcehttps://www.exploit-db.com/download/750/
    titleVeritas Backup Exec Agent 8.x/9.x - Browser Overflow C
  • descriptionVeritas Backup Exec Name Service Overflow. CVE-2004-1172. Remote exploit for windows platform
    idEDB-ID:16331
    last seen2016-02-01
    modified2010-06-22
    published2010-06-22
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16331/
    titleVeritas Backup Exec Name Service Overflow

Metasploit

descriptionThis module exploits a vulnerability in the Veritas Backup Exec Agent Browser service. This vulnerability occurs when a recv() call has a length value too long for the destination stack buffer. By sending an agent name value of 63 bytes or more, we can overwrite the return address of the recv function. Since we only have ~60 bytes of contiguous space for shellcode, a tiny findsock payload is sent which uses a hardcoded IAT address for the recv() function. This payload will then roll the stack back to the beginning of the page, recv() the real shellcode into it, and jump to it. This module has been tested against Veritas 9.1 SP0, 9.1 SP1, and 8.6.
idMSF:EXPLOIT/WINDOWS/BACKUPEXEC/NAME_SERVICE
last seen2020-06-01
modified2017-07-24
published2005-12-05
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/backupexec/name_service.rb
titleVeritas Backup Exec Name Service Overflow

Nessus

  • NASL familyGain a shell remotely
    NASL idVERITAS_BACKUP_EXEC_OVERFLOW2.NASL
    descriptionThe remote host is running a version of VERITAS Backup Exec Agent Browser which is vulnerable to a remote buffer overflow. An attacker may exploit this flaw to execute arbitrary code on the remote host or to disable this service remotely. To exploit this flaw, an attacker would need to send a specially crafted packet to the remote service.
    last seen2020-06-01
    modified2020-06-02
    plugin id16232
    published2005-01-24
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16232
    titleVERITAS Backup Exec Agent Browser Registration Request Remote Overflow
  • NASL familyWindows
    NASL idVERITAS_BACKUP_EXEC_OVERFLOW.NASL
    descriptionThe version of Veritas Backup Exec Agent Browser installed on the remote host is 8.x prior to 8.60.3878 hotfix 68, 9.0.x prior to 9.0.4454 hotfix 30, or 9.1.x prior to 9.1.4691 hotfix 40. It is, therefore, affected by a remote code execution vulnerability in the registration service (benetns.exe) due to a failure to validate the client hostname field during the registration process. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to cause a stack-based buffer overflow, resulting in the execution of arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id16230
    published2005-01-24
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16230
    titleVeritas Backup Exec Agent Browser 8.x < 8.60.3878 HF 68 / 9.0.x < 9.0.4454 HF 30 / 9.1.x < 9.1.4691 HF 40 RCE

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83019/name_service.rb.txt
idPACKETSTORM:83019
last seen2016-12-05
published2009-11-26
reporterH D Moore
sourcehttps://packetstormsecurity.com/files/83019/Veritas-Backup-Exec-Name-Service-Overflow.html
titleVeritas Backup Exec Name Service Overflow

Saint

bid11974
descriptionVERITAS Backup Exec Agent Browser hostname buffer overflow
idmisc_backupexec
osvdb12418
titlebackup_exec_agent_browser_hostname
typeremote