Veritas.Backup.Exec.Registry.Access
Description
This indicates an attempt to exploit a vulnerability in the VERITAS Backup Exec Server.
An unauthenticated remote user can gain access to the RPC interface on port 6106. With this access, an attacker can call RPC handlers to read, write or delete registry keys. The attacker could then use control of the registry to cause a denial of service and may be able to gain control of the system.
Affected Products
Veritas Software Backup Exec for Windows Servers 10.0 rev. 5484
Veritas Software Backup Exec for Windows Servers 9.1 rev. 4691
Veritas Software Backup Exec for Windows Servers 9.0 rev. 4454
Veritas Software Backup Exec for Windows Servers 9.0 rev. 4367
Impact
Compromise of the affected system.
Recommended Actions
Updates are available from Veritas.
VERITAS Software Security Advisory VX05-003:
http://seer.support.veritas.com/docs/276605.htm
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |