Vulnerabilities > CVE-2005-0771 - Unspecified vulnerability in Symantec Veritas Backup Exec
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Metasploit
description | This modules exploits a remote registry access flaw in the BackupExec Windows Server RPC service. This vulnerability was discovered by Pedram Amini and is based on the NDR stub information posted to openrce.org. Please see the action list for the different attack modes. |
id | MSF:AUXILIARY/ADMIN/BACKUPEXEC/REGISTRY |
last seen | 2020-05-23 |
modified | 2020-05-12 |
published | 2006-12-02 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/admin/backupexec/registry.rb |
title | Veritas Backup Exec Server Registry Access |
Nessus
NASL family | Gain a shell remotely |
NASL id | VERITAS_REGISTRY.NASL |
description | The remote host is running a version of VERITAS Backup Exec for Windows that is vulnerable to a remote registry access. An attacker may exploit this flaw to modify the remote registry and gain a full access to the system. To exploit this flaw, an attacker would need to send requests to the RPC service listening on port 6106. The patch for this vulnerability fixes other remote flaws (buffer overflows) that may allow an attacker to execute code on the remote host with SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19397 |
published | 2005-08-08 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/19397 |
title | VERITAS Backup Exec Agent Unauthenticated Remote Registry Access |
code |
|
References
- http://secunia.com/advisories/15789
- http://secunia.com/advisories/15789
- http://securitytracker.com/id?1014273
- http://securitytracker.com/id?1014273
- http://seer.support.veritas.com/docs/276605.htm
- http://seer.support.veritas.com/docs/276605.htm
- http://seer.support.veritas.com/docs/277429.htm
- http://seer.support.veritas.com/docs/277429.htm
- http://www.idefense.com/application/poi/display?id=269&type=vulnerabilities&flashstatus=true
- http://www.idefense.com/application/poi/display?id=269&type=vulnerabilities&flashstatus=true
- http://www.kb.cert.org/vuls/id/584505
- http://www.kb.cert.org/vuls/id/584505
- http://www.us-cert.gov/cas/techalerts/TA05-180A.html
- http://www.us-cert.gov/cas/techalerts/TA05-180A.html