Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2011-0546 |
CWE-ID | CWE-20 |
Exploitation vector | Local network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
Backup Exec Client/Desktop applications / Multimedia software |
Vendor | Veritas Technologies |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU45012
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:A/AC:H/PR:/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2011-0546
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote #AU# to execute arbitrary code.
Symantec Backup Exec 11.0, 12.0, 12.5, 13.0, and 13.0 R2 does not validate identity information sent between the media server and the remote agent, which allows man-in-the-middle attackers to execute NDMP commands via unspecified vectors.
MitigationInstall update from vendor's website.
Vulnerable software versionsBackup Exec: 11.0 - 13.0
External linkshttp://marc.info/?l=bugtraq&m=131489365508507&w=2
http://secunia.com/advisories/44698
http://securityreason.com/securityalert/8300
http://www.securityfocus.com/bid/47824
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110526_00
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.