Question..
Vulnerability Nessus ID 34820 shows that a server has the vulnerability:
Symantec Backup Exec Authentication Bypass and Potential Buffer Overflow
ID: 34820
<https://128.42.174.70/sc3/console.php?psid=8000&ctxid=8001%5enewscan%5eplug
inid:34820> Family: Gain root remotely NASL: PLUGIN.nasl
<https://128.42.174.70/sc3/console.php?view_nasl=PLUGIN.nasl>
Synopsis :
It is possible to bypass the backup agent authentication.
Description :
The remote host is running a version of VERITAS Backup Exec Agent which is
vulnerable to multiple authentication bypass issues.
An attacker may exploit this flaw to manage the backup agent and/or to
execute commands with high privileges.
Solution :
http://www.symantec.com/avcenter/security/Content/2008.11.19.html
Risk factor :
Critical / CVSS Base Score : 10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
But, this fix was to install the latest and greatest version of BES, which
it already has the newest version/the fix for this vulnerability.
So, why does the vulnerability still show positive? I was not able to open
the .nasl to see what the scan is doing:
But, I was not able to open the "PLUGIN.nasl"
Please advise. Thanks!
Dee
Vulnerability Nessus ID 34820 shows that a server has the vulnerability:
Symantec Backup Exec Authentication Bypass and Potential Buffer Overflow
ID: 34820
<https://128.42.174.70/sc3/console.php?psid=8000&ctxid=8001%5enewscan%5eplug
inid:34820> Family: Gain root remotely NASL: PLUGIN.nasl
<https://128.42.174.70/sc3/console.php?view_nasl=PLUGIN.nasl>
Synopsis :
It is possible to bypass the backup agent authentication.
Description :
The remote host is running a version of VERITAS Backup Exec Agent which is
vulnerable to multiple authentication bypass issues.
An attacker may exploit this flaw to manage the backup agent and/or to
execute commands with high privileges.
Solution :
http://www.symantec.com/avcenter/security/Content/2008.11.19.html
Risk factor :
Critical / CVSS Base Score : 10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
But, this fix was to install the latest and greatest version of BES, which
it already has the newest version/the fix for this vulnerability.
So, why does the vulnerability still show positive? I was not able to open
the .nasl to see what the scan is doing:
But, I was not able to open the "PLUGIN.nasl"
Please advise. Thanks!
Dee