Symantec Backup Exec Flaw Could Invite Data Theft

vulnerability Backup data

Symantec confirmed that the issue affects versions 9.1 and 9.2 of Symantec Backup Exec for NetWare Servers with Remote Agent for Windows Servers.

Cupertino, Calif.-based Symantec has released fixes for the NetWare issues and is looking into reports that the flaw also affects Backup Exec for Windows Servers, Backup Exec Continuous Protection Server (CPS) Remote Agent and other Backup Exec Remote Agents, according to a DeepSight Threat Management system bulletin.

The vulnerability affects the remote procedure call (RPC) interfaces of Backup Exec and could enable a remote attacker to send malicious code to the application and potentially gain complete control over the targeted machine. Even if the efforts were unsuccessful, the calls could result in a denial-of-service attack on the targeted system, Symantec said.

The RPC protocol, which allows an application running on one PC to execute a subroutine on another computer, was used by the 2003 Blaster worm to shut down Windows PCs without any user interaction.

Sponsored post

Ron Gula, CTO at Tenable Network Security, Columbia, Md., said the flaw's impact is limited somewhat by the fact that Backup Exec is usually installed on the internal network and isn't accessible from the Internet.

"However, this is where companies are putting all their critical data, so the last thing they want is to have a vulnerability there," Gula said.

Once attackers gain entry to the network, they can move around at will and access sensitive information, Gula added. "The real danger of this is that it could enable data theft and corporate espionage," he said.

Symantec's DeepSight Threat Management system rated the severity of the flaw as a 10 on a scale of 10.

Last August, Symantec patched a vulnerability in Backup Exec for Windows and NetWare servers that enabled attackers to manipulate a password in the authentication process between the server and the agent, giving them access to files stored on the server. A public exploit for that flaw was released on the Metasploit framework.