{"vuid":"VU#880801","idnumber":"880801","name":"Symantec VERITAS NetBackup Volume Manager daemon buffer overflow","keywords":["Symantec","VERITAS","NetBackup","buffer overflow","arbitrary code execution","volume manager","vmd.exe","vmd","backup"],"overview":"The Symantec VERITAS NetBackup Volume Manager daemon contains a buffer overflow vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":"Symantec VERITAS NetBackup Symantec VERITAS NetBackup is a client/server based backup software solution. NetBackup Volume Manager daemon The Symantec VERITAS NetBackup Volume Manager is a service used by NetBackup that finds volumes that are needed for backup or restore operations. The Volume Manager daemon (vmd) listens on 13701/tcp by default. The problem The Symantec VERITAS NetBackup Volume Manager daemon contains a stack-based buffer overflow.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.","resolution":"Install an update\nSymantec has provided updates for the vulnerable software in Security Advisory SYM06-006.","workarounds":"Restrict access Symantec has provided several workarounds for this vulnerability in Security Advisory SYM06-006, including restricting access to the vulnerable systems.","sysaffected":"","thanks":"This vulnerability was reported by Symantec, who in turn credit TippingPoint with reporting the vulnerability.","author":"This document was written by Will Dormann.","public":["http://seer.support.veritas.com/docs/281521.htm","http://www.zerodayinitiative.com/advisories/ZDI-06-005.html","http://secunia.com/advisories/19417/"],"cveids":["CVE-2006-0989"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-03-29T14:16:08Z","publicdate":"2006-03-27T00:00:00Z","datefirstpublished":"2006-03-29T19:51:01Z","dateupdated":"2007-01-12T21:40:51Z","revision":8,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"13","cam_exploitation":"0","cam_internetinfrastructure":"14","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"19","cam_attackeraccessrequired":"12","cam_scorecurrent":"34.6275","cam_scorecurrentwidelyknown":"43.605","cam_scorecurrentwidelyknownexploited":"69.255","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":34.6275,"vulnote":null}