{"vuid":"VU#378957","idnumber":"378957","name":"VERITAS Backup Exec uses hard-coded authentication credentials","keywords":["Veritas","Backup Exec","arbitrary file access","10000/tcp","Network Data Management Protocol","NDMP","Remote Agent","backup"],"overview":"The VERITAS Backup Exec Remote Agent uses hard-coded authentication credentials. An attacker with knowledge of these credentials could access arbitrary files on a vulnerable system.","clean_desc":"VERITAS Backup Exec Remote Agent is a data backup and recovery solution with support for over-the-network backup. The standard port for the Remote Agent is 10000/tcp. The VERITAS Backup Exec Remote Agent uses a hard-coded, encrypted root password. An attacker with knowledge of this password and access to the Remote Agent may be able to retrieve arbitrary files from a vulnerable system. For more information, please refer to SYM05-011. Note according to public reports, this vulnerability is actively being exploited.","impact":"A remote attacker may be able to gain access to and retrieve arbitrary files from a target system.","resolution":"Apply a security update\nInstall the security updates, as recommended by the Symantec Security Response SYM05-011. In addition, the following workarounds may mitigate this vulnerability.","workarounds":"Restrict access You may wish to block access to the vulnerable software from outside your network perimeter, specifically by blocking access to the ports used by VERITAS Backup Exec Remote Agent (typically 10000/tcp). This will limit your exposure to attacks. However, blocking at the network perimeter would still allow attackers within the perimeter of your network to exploit the vulnerability. The use of host-based firewalls in addition to network-based firewalls can help restrict access to specific hosts within the network. It is important to understand your network's configuration and service requirements before deciding what changes are appropriate. Change the default port for the backup service Changing the backup service's default port from 10000/tcp may reduce the chances of exploitation. Instructions on how to change the default port for the backup service are available in VERITAS support document 255174. Encrypt sensitive information To prevent attackers from reading sensitive information, consider encrypting it on your file system.","sysaffected":"","thanks":"This vulnerability was reported by \nSymantec","author":"This document was written by Jeff Gennari.","public":["http://seer.support.veritas.com/docs/278434.htm","http://support.veritas.com/docs/255831","http://seer.support.veritas.com/docs/255174.htm","http://seer.support.veritas.com/docs/258334.htm","http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html","http://securityresponse.symantec.com","http://secunia.com/advisories/16403/","http://www.frsirt.com/english/advisories/2005/1387","http://isc.sans.org/diary.php?date=2005-08-11","http://www.securitytracker.com/alerts/2005/Aug/1014662.html","http://xforce.iss.net/xforce/xfdb/21793","http://www.ndmp.org/"],"cveids":["CVE-2005-2611"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-08-12T13:05:15Z","publicdate":"2005-08-12T00:00:00Z","datefirstpublished":"2005-08-12T16:34:02Z","dateupdated":"2007-01-12T21:42:20Z","revision":108,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"20","cam_exploitation":"12","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"17","cam_attackeraccessrequired":"13","cam_scorecurrent":"36.98296875","cam_scorecurrentwidelyknown":"36.98296875","cam_scorecurrentwidelyknownexploited":"45.43621875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":36.98296875,"vulnote":null}