Vulnerabilities > CVE-2007-3509 - Buffer Overflow vulnerability in Symantec Veritas Backup Exec 10.0/10D/11D
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Heap-based buffer overflow in the RPC subsystem in Symantec Backup Exec for Windows Servers 10.0, 10d, and 11d allows remote attackers to cause a denial of service (process exit) and possibly execute arbitrary code via crafted ncacn_ip_tcp requests.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Nessus
NASL family | Windows |
NASL id | SYMANTEC_BACKUP_EXEC_RPC_HEAP_OVERFLOWS2.NASL |
description | The remote host is running a version of VERITAS Backup Windows RPC server which is vulnerable to a remote buffer overflow. An attacker may exploit this flaw to execute arbitrary code on the remote host or to disable this service remotely. To exploit this flaw, an attacker would need to send a specially crafted packet to the remote service. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25707 |
published | 2007-07-16 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25707 |
title | Symantec Backup Exec for Windows RPC Crafted ncacn_ip_tcp Request Remote Overflow |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=553
- http://secunia.com/advisories/26032
- http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11a.html
- http://www.kb.cert.org/vuls/id/213697
- http://www.osvdb.org/36111
- http://www.securityfocus.com/bid/23897
- http://www.securitytracker.com/id?1018366
- http://www.vupen.com/english/advisories/2007/2505
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35340