First published: Sun Mar 19 2006(Updated: )
Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Veritas Backup Exec | =9.1 | |
Symantec Veritas Backup Exec | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1298 has a moderate severity rating due to the potential for remote code execution.
To fix CVE-2006-1298, apply the latest patches and updates available for Veritas Backup Exec.
CVE-2006-1298 affects Veritas Backup Exec 9.1 and 10.0 for Windows Servers.
The potential impacts of CVE-2006-1298 include unauthorized access and execution of arbitrary code.
While CVE-2006-1298 is an older vulnerability, it may still be relevant for systems running affected versions of Backup Exec that have not been updated.