{"vuid":"VU#377441","idnumber":"377441","name":"Symantec VERITAS NetBackup contains a buffer overflow vulnerability in the Sharepoint Services daemon","keywords":["Symantec","VERITAS","NetBackup","buffer overflow","arbitrary code execution","Sharepoint Services","bpspsserver","vnetd","backup"],"overview":"The Symantec VERITAS NetBackup Volume Manager daemon contains a buffer overflow vulnerability which may allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":"Symantec VERITAS NetBackup is a client/server based backup software solution. The Sharepoint Services server (bpspsserver) daemon is enabled by default on both servers and clients in the NetBackup 6.0 release for Windows, and is used to support Microsoft SharePoint Servers on a network. A buffer overflow vulnerability exists in this component that could allow a remote attacker to execute code on a vulnerable system.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.","resolution":"Install an update Symantec has provided updates for the vulnerable software in Security Advisory SYM06-006.","workarounds":"Disable or remove service for Microsoft Sharepoint Servers if not required Symantec has provided several workarounds for this vulnerability in Security Advisory SYM06-006, including disabling or removing the Sharepoint Services server.","sysaffected":"","thanks":"Thanks to TippingPoint Security Research for reporting this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["http://www.tippingpoint.com/security/advisories/TSRT-06-01.html","http://secunia.com/advisories/19417/"],"cveids":["CVE-2006-0991"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-03-29T14:07:42Z","publicdate":"2006-03-27T00:00:00Z","datefirstpublished":"2006-03-29T21:03:47Z","dateupdated":"2007-01-12T21:41:08Z","revision":5,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"19","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"16.03125","cam_scorecurrentwidelyknown":"20.0390625","cam_scorecurrentwidelyknownexploited":"36.0703125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":16.03125,"vulnote":null}