First published: Wed Dec 22 2004(Updated: )
Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Veritas Backup Exec | =9.1 | |
Symantec Veritas Backup Exec | =8.5 | |
Symantec Veritas Backup Exec | =9.0 | |
Symantec Veritas Backup Exec | =8.6 | |
Symantec Veritas Backup Exec | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1172 has a high severity due to the potential for remote code execution.
To fix CVE-2004-1172, update Veritas Backup Exec to version 8.60.3878 Hotfix 68 or 9.1.4691 Hotfix 40 or later.
CVE-2004-1172 affects Symantec Veritas Backup Exec versions 8.0 through 9.1.
Yes, CVE-2004-1172 can be exploited remotely through a specially crafted registration request.
CVE-2004-1172 is a stack-based buffer overflow vulnerability.