TUCoPS :: Security App Flaws :: b06-1115.htm

Symantec Security Advisory, SYM06-005
Symantec Security Advisory, SYM06-005
Symantec Security Advisory, SYM06-005



Symantec Security Advisory
SYM06-005
17 March 2006 

Veritas Backup Exec for Windows Servers: Media Server BENGINE Service Job
log Format String Overflow

Revision History
None 

Severity
Low (network/system authorization and specific configuration required)

Remote Access Yes
Local Access No 
Authentication Required Yes 
Exploit publicly available No  

Overview
Backup Exec for Windows Servers Media Server is susceptible to a format string vulnerability in the job log in BENGINE.exe when job logging is
configured with full details enabled. (Not the default configuration)
An authorized user on the network with a system configured for backup could potentially host a specifically-formatted file on their system. If the file name is properly mal-formatted AND the backup is being run with job logs enabled in Full Details mode, the malicious user could cause a denial of service on the Media Server or may potentially be able to run arbitrary code on the system hosting the Media Server.

Full Advisory available @
http://www.symantec.com/avcenter/security/Content/2006.03.17b.html 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH