CVE-2005-2611
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
17/08/2005
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server.
Impacto
Puntuación base 2.0
10.00
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4019:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4170:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4172:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4174:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.0.4202:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.306:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.307:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1067_.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1127_.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1151_.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1152_.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1154:*:*:*:*:*:*:* | ||
cpe:2.3:a:symantec_veritas:backup_exec:netware_servers_9.1.1156:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/16403
- http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html
- http://securitytracker.com/id?1014662=
- http://www.kb.cert.org/vuls/id/378957
- http://www.securityfocus.com/bid/14551
- http://www.us-cert.gov/cas/techalerts/TA05-224A.html
- http://www.vupen.com/english/advisories/2005/1387
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21793
- http://secunia.com/advisories/16403
- http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html
- http://securitytracker.com/id?1014662=
- http://www.kb.cert.org/vuls/id/378957
- http://www.securityfocus.com/bid/14551
- http://www.us-cert.gov/cas/techalerts/TA05-224A.html
- http://www.vupen.com/english/advisories/2005/1387
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21793