[NT] Symantec Backup Exec Job Engine Denial of Service



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Symantec Backup Exec Job Engine Denial of Service
------------------------------------------------------------------------


SUMMARY


<http://www.symantec.com/business/products/overview.jsp?pcid=2244&pvid=57_1> Symantec Backup Exec 11d for Windows Servers is "the gold standard in Windows data recovery, providing cost-effective, high-performance, and certified disk-to-disk-to-tape backup and recovery with available continuous data protection for Microsoft Exchange, SQL, file servers, and workstations. High-performance agents and options provide fast, flexible, granular protection and recovery, and scalable management of local and remote server backups."

Secunia Research has discovered some vulnerabilities in Symantec Backup
Exec for Windows Servers, which can be exploited by malicious people to
cause a DoS (Denial of Service).

DETAILS

Vulnerable Systems:
* Symantec Backup Exec for Windows Servers version 11d (11.0 rev 7170)

1) A NULL-pointer dereference error in the Backup Exec Job Engine service
(bengine.exe) when handling exceptions can be exploited to crash the
service by sending a specially crafted packet to default port 5633/TCP.

2) Two integer overflow errors within the Backup Exec Job Engine service
can be exploited to e.g. cause the service to enter an infinite loop and
exhaust all available memory or consume large amounts of CPU resource by
sending a specially crafted packet to default port 5633/TCP.

Solution:
Apply hotfixes.

Build 11.0.6235: <http://support.veritas.com/docs/294241>
http://support.veritas.com/docs/294241

Build 11.0.7170: <http://support.veritas.com/docs/294237>
http://support.veritas.com/docs/294237

Time Table:
02/10/2007 - Vendor notified.
02/10/2007 - Vendor replied.
28/11/2007 - Public disclosure.


ADDITIONAL INFORMATION

The information has been provided by Secunia Research.
The original article can be found at:
<http://secunia.com/secunia_research/2007-74/>
http://secunia.com/secunia_research/2007-74/



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [UNIX] Solaris Socket Hijack Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... By binding a socket with an already binded port number of specific IP ... attackers can hijack an already binded sockets in Solaris. ... A bug with Solaris Kernel flag of SO_REUSEADDR cause the Kernel to accept ...
    (Securiteam)
  • [EXPL] Quake 3 Buffer Overflow (Exploit)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... port and exit cleanly with an unsuspicious error message. ... unsigned char ipx; ... int hooklen; // for both sendservercommand and directconnect ...
    (Securiteam)
  • [TOOL] IRC DCC Connect() Blind Port Scanner
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... IRC DCC ConnectBlind Port Scanner ... After waiting a short while for the mIRC client ...
    (Securiteam)
  • [NT] SLMail Pro Multiple Denial of Service
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The SLMail Pro Web Service running on port 801 is ... int main{ ...
    (Securiteam)
  • [EXPL] TCP Window Size RST
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... (IP addresses of the peers and port numbers). ... be used to reset any TCP connection once the range of sequence numbers is ... irssi's window size was larger so I figured ...
    (Securiteam)