Veritas.Backup.Exec.Registry.Access

description-logoDescription

This indicates an attempt to exploit a vulnerability in the VERITAS Backup Exec Server.
An unauthenticated remote user can gain access to the RPC interface on port 6106. With this access, an attacker can call RPC handlers to read, write or delete registry keys. The attacker could then use control of the registry to cause a denial of service and may be able to gain control of the system.

affected-products-logoAffected Products

Veritas Software Backup Exec for Windows Servers 10.0 rev. 5484
Veritas Software Backup Exec for Windows Servers 9.1 rev. 4691
Veritas Software Backup Exec for Windows Servers 9.0 rev. 4454
Veritas Software Backup Exec for Windows Servers 9.0 rev. 4367

Impact logoImpact

Compromise of the affected system.

recomended-action-logoRecommended Actions

Updates are available from Veritas.
VERITAS Software Security Advisory VX05-003:
http://seer.support.veritas.com/docs/276605.htm

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)