Vulnerabilities > CVE-2006-1298 - Remote Format String vulnerability in Veritas Backup Exec Media Server BEngine Service Job Log
Summary
Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec. This vulnerability can only be exploited if the 'job log' mode is set to "Full Detailed" (aka Full Details). Other older versions of Windows Server (those that have been End-Of-Life'd) should be upgraded to the latest patch of one of the current versions listed above.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
References
- http://secunia.com/advisories/19242
- http://securitytracker.com/id?1015785
- http://support.veritas.com/docs/282254
- http://www.securityfocus.com/archive/1/428223/100/0/threaded
- http://www.securityfocus.com/bid/17096
- http://www.symantec.com/avcenter/security/Content/2006.03.17b.html
- http://www.vupen.com/english/advisories/2006/0996
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25310