First published: Wed May 10 2017(Updated: )
In Veritas Backup Exec 2014 before build 14.1.1187.1126, 15 before build 14.2.1180.3160, and 16 before FP1, there is a use-after-free vulnerability in multiple agents that can lead to a denial of service or remote code execution. An unauthenticated attacker can use this vulnerability to crash the agent or potentially take control of the agent process and then the system it is running on.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Veritas Backup Exec | <14.1.1786.1126 | |
Veritas Backup Exec | <14.2.1180.3160 | |
Veritas Backup Exec | <16.0.1142.1327 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8895 has a high severity rating due to its potential for remote code execution and denial of service.
To fix CVE-2017-8895, update Veritas Backup Exec to version 14.1.1187.1126 or later, 14.2.1180.3160 or later, or apply the latest firmware for version 16.
CVE-2017-8895 affects versions of Veritas Backup Exec prior to specific build numbers stated in the vulnerability description.
Yes, CVE-2017-8895 can be exploited by an unauthenticated attacker remotely.
Exploitation of CVE-2017-8895 may lead to service disruptions or unauthorized remote code execution on affected systems.