Vulnerabilities > CVE-2005-3116 - Unspecified vulnerability in Symantec Veritas Netbackup
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet.
Vulnerable Configurations
Exploit-Db
description | Veritas NetBackup 4/5 Volume Manager Daemon Remote BoF Exploit. CVE-2005-3116. Remote exploit for windows platform |
id | EDB-ID:1421 |
last seen | 2016-01-31 |
modified | 2006-01-16 |
published | 2006-01-16 |
reporter | Patrick Thomassen |
source | https://www.exploit-db.com/download/1421/ |
title | Veritas NetBackup 4/5 Volume Manager Daemon Remote BoF Exploit |
Nessus
NASL family | Windows |
NASL id | VERITAS_NETBACKUP_VMD_OVERFLOW.NASL |
description | The remote host is running a version of VERITAS NetBackup Volume Manager that is vulnerable to a remote buffer overflow. An attacker may exploit this flaw to execute arbitrary code on the remote host with the privileges of a local administrator or to disable the remote service remotely. To exploit this flaw, an attacker would need to send a specially crafted packet to the remote service. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20182 |
published | 2005-11-11 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20182 |
title | VERITAS NetBackup Volume Manager Daemon Buffer Overflow |
code |
|
Saint
bid | 15353 |
description | VERITAS NetBackup Volume Manager Daemon buffer overflow |
id | misc_netbackupvmd |
osvdb | 20674 |
title | veritas_netbackup_vmd |
type | remote |
References
- http://secunia.com/advisories/17503
- http://secunia.com/advisories/17503
- http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html
- http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html
- http://securitytracker.com/id?1015170
- http://securitytracker.com/id?1015170
- http://seer.support.veritas.com/docs/279553.htm
- http://seer.support.veritas.com/docs/279553.htm
- http://www.idefense.com/application/poi/display?id=336&type=vulnerabilities
- http://www.idefense.com/application/poi/display?id=336&type=vulnerabilities
- http://www.kb.cert.org/vuls/id/574662
- http://www.kb.cert.org/vuls/id/574662
- http://www.osvdb.org/20674
- http://www.osvdb.org/20674
- http://www.securityfocus.com/archive/1/422066/100/0/threaded
- http://www.securityfocus.com/archive/1/422066/100/0/threaded
- http://www.securityfocus.com/archive/1/422157/100/0/threaded
- http://www.securityfocus.com/archive/1/422157/100/0/threaded
- http://www.securityfocus.com/bid/15353
- http://www.securityfocus.com/bid/15353
- http://www.vupen.com/english/advisories/2005/2349
- http://www.vupen.com/english/advisories/2005/2349
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22985
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22985