Symantec Veritas NetBackup PureDisk管理界面安全绕过漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1193791 漏洞类型 访问验证错误
发布时间 2006-08-15 更新时间 2007-06-27
CVE编号 CVE-2006-4228 CNNVD-ID CNNVD-200608-305
漏洞平台 N/A CVSS评分 9.0
|漏洞来源
https://www.securityfocus.com/bid/19524
https://cxsecurity.com/issue/WLB-2006080121
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-305
|漏洞详情
SymantecNetBackupPureDisk是一款远程办公室的备份软件。SymantecNetBackupPureDisk在访问认证的实现上存在漏洞,远程攻击者可能利用此漏洞绕过访问认证。默认下只能通过SSLWeb连接访问SymantecVeritasNetBackupPureDisk管理界面,但能够访问运行了SymantecVeritasNetBackupPureDisk管理界面的网络和服务器的非特权用户可以绕过管理界面认证,在服务器上获得权限提升。
|漏洞EXP
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Symantec Security Advisory

SYM06-015

16 August 2006

Symantec NetBackup PureDisk:  Non-Privileged User Authentication Bypass
Elevation of Privilege

Revision History
None

Severity
Medium (highly dependent on network configuration)

Remote Access
Yes
Local Access
No
Authentication Required
Yes (to network) 
Exploit publicly available
No

Overview
Symantec discovered a security issue in Symantec's Veritas NetBackup 6.0
PureDisk Remote Office Edition. An unauthorized user with access to the
network and the
server hosting the management interface can potentially bypass the
management interface
authentication to gain access and elevate their privileges on the
system.

Supported Product(s) Affected 
Product:  Symantec Veritas NetBackup PureDisk Remote 
Office Edition (all platforms)
Version: 6.0
Builds: GA, MP1
Solution: NB_PDE_60_MP1_P01

NOTE: For systems running NetBackup 6.0 GA PureDisk Remote Office
Edition
it will be necessary to install Maintenance Pack 1  prior to applying
this
Security
Pack.
This issue ONLY affects the product and versions listed above. 
 
Details
An internal review revealed a potential elevation of privilege issue in
the
Symantec Veritas NetBackup PureDisk management interface.  The
management
interface is
accessible only through an SSL web connection by default.  However it is
possible for a
non-privileged user with access to the network and the server hosting
the
Symantec Veritas NetBackup
PureDisk management interface, to bypass the management interface
authentication and
further leverage their access to elevate privileged access on the
server.

Symantec Response
Symantec engineers have addressed the issues identified above and made
Security updates available.
Symantec strongly recommends all customers apply the latest security
update
to protect against threats of this nature.
Symantec knows of no exploitation of or adverse customer impact from
these
issues.

The patches listed above for affected products are available through the
following location: 
 http://support.veritas.com/docs/284734 for Symantec Veritas NetBackup
PureDisk Remote Office Edition.

Best Practices 
As part of normal best practices, Symantec recommends: 
- - - Restrict access to administration or management systems to
authorized
privileged users only
- - - Block remote access to all ports not essential for efficient
operation
- - - Restrict remote access, if required, to trusted/authorized systems
only
- - - Remove/disable unnecessary accounts or restrict access according
to
security policy as required 
- - - Run under the principle of least privilege where possible
- - - Keep all operating systems and applications updated with the
latest
vendor patches 
- - - Follow a multi-layered approach to security. Run both firewall and
antivirus applications, at a minimum, to provide multiple points of
detection and protection to
both inbound and outbound threats 
- - - Deploy network intrusion detection systems to monitor network
traffic
for
signs of anomalous or suspicious activity. This may aid in detection of
attacks or
Malicious activity related to exploitation of latest vulnerabilities

CVE 
A CVE Candidate name is being requested from the Common Vulnerabilities
and
Exposures(CVE) initiative for this issue. This advisory will be revised
accordingly
upon receipt of the CVE Candidate name.
This issue is a candidate for inclusion in the CVE list
(http://cve.mitre.org), which standardizesnames for security problems.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)

iQEVAwUBRON4lRy6+gFWHby+AQigiwgAwk0k8rQhhhC9lRiTuHm+sSjPCoLHRSH/
OkR2WNZxSMP3z4AkYeJ7r/h465diPIdnkwAK9Q7pWpberooK2ffF2e5QpgIGLvB+
GoyyZddrAoKdix8wcQj9bgix+W+OiD93Bmh1q/iSBdFgJ6IvQNzEwdqLr2LXkG+W
clz7Asv8LOn6p2kPACDQOKNGMJvlQD8csdRRo+bNUtjv8FGiZB7Q+NXKjlZa5JRB
+ZlXWKfrlY5mjREcd7cTumif88wG7B4vc6Be0aPI0bGnICLdTT+xCwnKaGVLR+0i
QucuAn5xJDn6of2HZ4IuGfKgTpdtO5uYIta5xRKhWew2r+1MjM5rTw==
=sQoe
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

Symantec Security Advisory

SYM06-015

16 August 2006

Symantec NetBackup PureDisk:  Non-Privileged User Authentication Bypass

Elevation of

Privilege

Revision History

None

Severity

Medium (highly dependent on network configuration)

Remote Access

Yes

Local Access

No

Authentication Required

Yes (to network)

Exploit publicly available

No

Overview

Symantec discovered a security issue in Symantec's Veritas NetBackup 6.0

PureDisk Remote

Office Edition. An unauthorized user with access to the network and the

server hosting the

management interface can potentially bypass the management interface

authentication to gain

access and elevate their privileges on the system.

Supported Product(s) Affected

Product:  Symantec Veritas NetBackup PureDisk Remote

Office Edition (all platforms)

Version: 6.0

Builds: GA, MP1

Solution: NB_PDE_60_MP1_P01

NOTE: For systems running NetBackup 6.0 GA PureDisk Remote Office Edition

it will be

necessary to install Maintenance Pack 1  prior to applying this Security

Pack.

This issue ONLY affects the product and versions listed above.

Details

An internal review revealed a potential elevation of privilege issue in the

Symantec Veritas

NetBackup PureDisk management interface.  The management interface is

accessible only

through an SSL web connection by default.  However it is possible for a

non-privileged user with

access to the network and the server hosting the Symantec Veritas NetBackup

PureDisk

management interface, to bypass the management interface authentication and

further leverage

their access to elevate privileged access on the server.

Symantec Response

Symantec engineers have addressed the issues identified above and made

Security updates

available.

Symantec strongly recommends all customers apply the latest security update

to protect against

threats of this nature.

Symantec knows of no exploitation of or adverse customer impact from these

issues.

The patches listed above for affected products are available through the

following location:

http://support.veritas.com/docs/284734 for Symantec Veritas NetBackup

PureDisk Remote

Office Edition.

Best Practices

As part of normal best practices, Symantec recommends:

- - Restrict access to administration or management systems to authorized

privileged users

only

- - Block remote access to all ports not essential for efficient operation

- - Restrict remote access, if required, to trusted/authorized systems only

- - Remove/disable unnecessary accounts or restrict access according to

security policy as

required

- - Run under the principle of least privilege where possible

- - Keep all operating systems and applications updated with the latest

vendor patches

- - Follow a multi-layered approach to security. Run both firewall and

antivirus applications,

at a minimum, to provide multiple points of detection and protection to

both inbound and

outbound threats

- - Deploy network intrusion detection systems to monitor network traffic for

signs of

anomalous or suspicious activity. This may aid in detection of attacks or

malicious

activity related to exploitation of latest vulnerabilities

CVE

A CVE Candidate name is being requested from the Common Vulnerabilities and

Exposures

(CVE) initiative for this issue. This advisory will be revised accordingly

upon receipt of the CVE

Candidate name.

This issue is a candidate for inclusion in the CVE list

(http://cve.mitre.org), which standardizes

names for security problems.

-----BEGIN PGP SIGNATURE-----

Version: PGP Desktop 9.0.6 (Build 6060)

iQEVAwUBRON2CBy6+gFWHby+AQhJAwf/dXuTHhkFJ+cqnVxFiDaBdpH0zkrb0zDU

H9d6txyy7kiFa8D8Ul2bVHT0fARLmkiCzOrdkOKujV/cIgORSGm5MaghJpOnz6mB

/eM7G/iv2AWfxjHVByDrWxnDP3+MQIBCLH+oix5TthcipHLOONoEK2NowJm/idoa

rkyDIzDLbx9zzikD89BwIn2BiR0DZFm8wpF4D3X0PTQFsh/klfy39LOjQgM/HDZN

mrNL9OQyTjif+L9SkGKGHgOavTOrVwZqn52u7a2D/RHTy7iWuFNpy1Md8yLa/hZg

Yhb3CLAHwAPFHz1d86rWscsu3ERLdGaKjgxoWFlKyKSVfaXGIxxzeA==

=+N1w

-----END PGP SIGNATURE-----
|受影响的产品
Symantec Veritas NetBackup PureDisk Remote Office Edition 6.0
|参考资料

来源:BID
名称:19524
链接:http://www.securityfocus.com/bid/19524
来源:BUGTRAQ
名称:20060816SYM06-16SymantecNetBackupPureDiskRemoteOfficeEditionElevationofPrivilege
链接:http://www.securityfocus.com/archive/1/archive/1/443395/100/0/threaded
来源:VUPEN
名称:ADV-2006-3299
链接:http://www.frsirt.com/english/advisories/2006/3299
来源:seer.entsupport.symantec.com
链接:http://seer.entsupport.symantec.com/docs/284734.htm
来源:securityresponse.symantec.com
链接:http://securityresponse.symantec.com/avcenter/security/Content/2006.08.16.html
来源:SECUNIA
名称:21507
链接:http://secunia.com/advisories/21507
来源:XF
名称:netbackup-puredisk-auth-bypass(28415)
链接:http://xforce.iss.net/xforce/xfdb/28415
来源:BUGTRAQ
名称:20060817Re:SYM06-16SymantecNetBackupPureDiskRemoteOfficeEditionElevationofPrivilege
链接:http://www.securityfocus.com/archive/1/archive/1/443520/100/0/threaded
来源:SECTRACK
名称:1016704
链接:http://securitytracker.com/id?1016704
来源:SREASON
名称:1412
链接:http://securityreason.com/securityalert/1412