First published: Tue Mar 28 2006(Updated: )
Buffer overflow in the NetBackup Sharepoint Services server daemon (bpspsserver) on NetBackup 6.0 for Windows allows remote attackers to execute arbitrary code via crafted "Request Service" packets to the vnetd service (TCP port 13724).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Veritas NetBackup | =4.5.0-fp | |
Veritas NetBackup | =5.0 | |
Veritas NetBackup | =5.0 | |
Veritas NetBackup | =5.1 | |
Veritas NetBackup | =5.1 | |
Veritas NetBackup | =4.5.0-mp | |
Veritas NetBackup | =4.5.0-fp | |
Veritas NetBackup | =4.5.0-mp | |
Veritas NetBackup | =6.0 | |
Veritas NetBackup | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0991 is classified as a critical severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2006-0991, upgrade to a patched version of Veritas NetBackup that addresses this buffer overflow vulnerability.
CVE-2006-0991 affects Veritas NetBackup versions 4.5.0, 5.0, 5.1, and 6.0.
Yes, CVE-2006-0991 can be exploited remotely through specially crafted 'Request Service' packets sent to the vulnerable NetBackup service.
The impact of CVE-2006-0991 includes the risk of arbitrary code execution, which can lead to complete system compromise.