VERITAS NetBackup bpcd daemon command chaining vulnerability
Added: 02/16/2007CVE: CVE-2006-4902
BID: 21565
OSVDB: 31334
Background
VERITAS NetBackup is a backup and recovery solution for multiple platforms.Problem
The NetBackup bpcd daemon fails to properly validate chained commands. A remote attacker could execute arbitrary commands by appending the commands to valid commands.Resolution
Apply one of the maintenance packs referenced in the Symantec Security Advisory.References
http://www.kb.cert.org/vuls/id/252936http://www.symantec.com/avcenter/security/Content/2006.12.13a.html
Limitations
Exploit works on VERITAS NetBackup 5.0 and requires the target host to have the ability to connect back to SAINTexploit on ports 990/TCP and 69/UDP.In order for the exploit to succeed, the address of the host running SAINTexploit must be present in Unicode format in the following registry key on the target:
Key: HKEY_LOCAL_MACHINE\SOFTWARE\VERITAS\NetBackup\CurrentVersion\Config Value: Server Type: MULTI_SZ
This exploit requires the PERL threads module to be installed on the host running SAINTexploit.
Platforms
WindowsBack to exploit index