Question..

 

Vulnerability Nessus ID 34820 shows that a server has the vulnerability:

 

Symantec Backup Exec Authentication Bypass and Potential Buffer Overflow 

ID: 34820
<https://128.42.174.70/sc3/console.php?psid=8000&ctxid=8001%5enewscan%5eplug
inid:34820> Family: Gain root remotely NASL: PLUGIN.nasl
<https://128.42.174.70/sc3/console.php?view_nasl=PLUGIN.nasl> 


Synopsis :

It is possible to bypass the backup agent authentication.

Description :

The remote host is running a version of VERITAS Backup Exec Agent which is
vulnerable to multiple authentication bypass issues.

An attacker may exploit this flaw to manage the backup agent and/or to
execute commands with high privileges.

Solution :

http://www.symantec.com/avcenter/security/Content/2008.11.19.html

Risk factor :

Critical / CVSS Base Score : 10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

 

But, this fix was to install the latest and greatest version of BES, which
it already has the newest version/the fix for this vulnerability.

 

So, why does the vulnerability still show positive?  I was not able to open
the .nasl to see what the scan is doing:

 

But, I was not able to open the "PLUGIN.nasl" 

 

Please advise.  Thanks!

 

Dee

 

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to