Operating System:

[Win]

Published:

29 February 2008

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                          ESB-2008.0220 -- [Win]
       Multiple vulnerabilities in the Backup Exec 11d and 12.0 for
                         Windows Servers scheduler
                             29 February 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Symantec Backup Exec for Windows 11d 11.0.6235
                      Symantec Backup Exec for Windows 11d 11.0.7170
                      Symantec Backup Exec for Windows 12 12.0.1364
Publisher:            Symantec
Operating System:     Windows
Impact:               Execute Arbitrary Code/Commands
                      Denial of Service
                      Overwrite Arbitrary Files
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-6017 CVE-2007-6016

Original Bulletin:    http://support.veritas.com/docs/300471

- --------------------------BEGIN INCLUDED TEXT--------------------

Symantec Security Advisory SYM08-007

28 February, 2008

Symantec's Backup Exec for Windows Server:  Multiple Vulnerabilities
in Scheduler

Revision History
None

Severity
Medium

Requirements	 
Remote Access	Yes
Local Access	No
Authentication Required	Authenticated user involvment required
Exploited publicly available	No

Overview
Vulnerabilities were reported in an ActiveX control that Symantec's
Backup Exec for Windows Servers (BEWS) installs with its scheduler.
Exploitation of these issues could possibly lead to unauthorized
information disclosure, system information corruption or potentially
allow arbitrary code execution in the context of the user's browser.
However, successful exploitation requires specific conditions.

Affected Products

Product	Version	Build	Solution
Symantec Backup Exec for Windows  11d  11.0.6235  Hotfix Available
Symantec Backup Exec for Windows  11d  11.0.7170  Hotfix Available
Symantec Backup Exec for Windows  12   12.0.1364  Hotfix Available

NOTE: ONLY the products and versions listed as affected above are
vulnerable to these issues. This issue impacts the Backup Exec media
server only. Remote client agents are NOT affected.

How to obtain the patch:
For 32bit Media Servers:
Backup Exec 11.0.6235:http://support.veritas.com/docs/300630
Backup Exec 11.0.7170:http://support.veritas.com/docs/300627
Backup Exec 12.0.1364:http://support.veritas.com/docs/300632

For 64bit Media Servers:
Backup Exec 11.0.6235:http://support.veritas.com/docs/300631
Backup Exec 11.0.7170:http://support.veritas.com/docs/300628
Backup Exec 12.0.1364:http://support.veritas.com/docs/300633


To which versions of Backup Exec can this hotfix be applied?

This hotfix can only be applied to the following versions of Backup Exec:
Backup Exec 11d for Windows Servers revision 6235 with Service Pack 2
Backup Exec 11d for Windows Servers revision 7170 with Service Pack 2
Backup Exec 12.0 for Windows Servers revision 1364

Details

Symantec was alerted to multiple vulnerabilities consisting of stack
overflows and unsafe method calls that Secunia Research discovered
in an ActiveX control, installed with BEWS as a part of the scheduler
component. Although this control was not intended to be called via
an external web browser, it failed to properly parse or validate
external input.  This improper validation could potentially result
in a browser crash or it could possibly permit unauthorized methods
calls allowing access to overwrite or corrupt files.  Unauthorized
access to the vulnerable control could also result in possible
buffer overflows with the potential for malicious code execution
in the context of the targeted user's browser.

The impact of this threat is considerably lessened as it would
require authorized user involvement in any attempt to compromise
the targeted system.  To exploit successfully, an attacker would
need to be aware of the exact path to the vulnerable control and
be able to effectively entice a user to upload and execute malicious
scripts via HTML email or visit a malicious web site hosting malicious
code.

Symantec Response
Symantec product engineers have developed and released solutions
for this issue through Symantec's LiveUpdate capability and support
channels as indicated.

Symantec recommends all customers apply all updates to protect
against threats of this nature.

Symantec knows of no exploitation of or adverse customer impact
from these issues.

The patches listed above for affected products are also available
from the following location:

Backup Exec 11.0.6235: http://support.veritas.com/docs/300619 
Backup Exec 11.0.7170: http://support.veritas.com/docs/297620 
Backup Exec 12.0.1364: http://support.veritas.com/docs/300287 

Mitigation
Symantec has developed IDS signatures to detect and block attempts
to exploit this issue.

Best Practices
As part of normal best practices, Symantec strongly recommends a
multi-layered approach to security:

    * Run under the principle of least privilege where possible.
    * Keep all operating systems and applications updated with the
    latest vendor patches.
    * Users, at a minimum, should run both a personal firewall and
    antivirus application with current updates to provide multiple
    points of detection and protection to both inbound and outbound
    threats.
    * Users should be cautious of mysterious attachments and
    executables delivered via email and be cautious of browsing
    unknown/untrusted websites or opening unknown/untrusted URL
    links.
    * Do not open unidentified attachments or executables from
    unknown sources or that you didn't request or were unaware of.
    * Always err on the side of caution. Even if the sender is
    known, the source address may be spoofed.
    * If in doubt, contact the sender to confirm they sent it and
    why before opening the attachment. If still in doubt, delete
    the attachment without opening it.


Credit
Symantec would like to thank JJ Reyes with Secunia Research for
reporting these findings and coordinating closely with Symantec as
we resolved the issues.


References
The Common Vulnerabilities and Exposures (CVE) initiative has
assigned:
CVE-2007-6016 to the buffer overflow issue
CVE-2007-6017 to the unsafe methods issue
These issues are candidates for inclusion in the CVE list
(http://cve.mitre.org ), which standardizes names for security
issues.

SecurityFocus (http://www.securityfocus.com/ ) has assigned Bugtraq
ID BID 26904 for the buffer overflows and BID 28008 for the unsafe
methods for inclusion in the SecurityFocus vulnerability database.

Related Documents:

297853: Symantec Backup Exec (tm) 11.0 (11d) for Windows Servers
revision 7170 Hotfix 39 - Security Hotfix - Requires Service Pack 2
 http://support.veritas.com/docs/297853


300287: Symantec Backup Exec (tm) 12.0 for Windows Servers revision
1364 Hotfix 300287 - Security Hotfix
 http://support.veritas.com/docs/300287


300619: Symantec Backup Exec (tm) 11.0 (11d) for Windows Servers
revision 6235 Hotfix 31 - Security Hotfix - Requires Service Pack 2
 http://support.veritas.com/docs/300619


300627: be7170RHF39_32bit_300627.exe  Symantec Backup Exec (tm)
11.0 (11d) for Windows Servers revision 7170 (32bit) - Hotfix 39 -
Security Hotfix - Requires Backup Exec 11.0.7170 Service Pack 2
 http://support.veritas.com/docs/300627


300628: be7170RHF39_x64bit_300628.exe  Symantec Backup Exec (tm)
11.0 (11d) for Windows Servers revision 7170 (64bit) - Hotfix 39 -
Security Hotfix - Requires Backup Exec 11.0.7170 Service Pack 2
 http://support.veritas.com/docs/300628


300630: be6235RHF31_32bit_300630.exe  Symantec Backup Exec (tm)
11.0 (11d) for Windows Servers revision 6235 (32bit) - Hotfix 31 -
Security Hotfix - Requires Backup Exec 11.0.6235 Service Pack 2
 http://support.veritas.com/docs/300630


300631: be6235RHF31_x64bit_300631.exe  Symantec Backup Exec (tm)
11.0 (11d) for Windows Servers revision 6235 (64bit) - Hotfix 31 -
Security Hotfix - Requires Backup Exec 11.0.6235 Service Pack 2
 http://support.veritas.com/docs/300631


300632: be1364R300287_32bit_300632.exe  Symantec Backup Exec (tm)
12.0 for Windows Servers revision 1364 (32bit) - Hotfix 300287 -
Security Hotfix
 http://support.veritas.com/docs/300632


300633: be1364R300287_x64bit_300633.exe  Symantec Backup Exec (tm)
12.0 for Windows Servers revision 1364 (64bit) - Hotfix 300287 -
Security Hotfix
 http://support.veritas.com/docs/300633

Products Applied:
 Backup Exec for Windows Servers 11d (11.0), 11d (11.0) 6235, 11d
 (11.0) 7170, 11d (11.0) 7170 SP1, 11d (11.0) 7170 SP2, 12.0

Last Updated: February 28 2008 03:27 PM GMT
Expires on: 02-27-2009
Subscribe Via E-Mail IconSubscribe to receive critical updates about
this document

Subjects:
 Backup Exec for Windows Servers
   Application: Troubleshooting
   Publishing Status: Techalert

Languages:
 Russian, English (US), French, German, Spanish, Italian, Japanese,
 Chinese, Korean

Operating Systems:
Windows 2000

Advanced Server SP4, Advanced Server Windows Powered SP4, Datacenter
Server SP4, Professional SP4, Server SP4

Windows NT Small Business Server

2000

Windows XP

Pro 5.1 64 bit SP2, Pro 5.1 SP2

Windows Server 2003

DataCenter, DataCenter (x64), DataCenter SP1, DataCenter SP1(x64),
DataCenter SP2, Datacenter SP2(x64), Enterprise (x64), Enterprise
SP1(IA64), Enterprise SP1(x64), Enterprise SP2, Enterprise SP2(x64),
Enterprise Server, Enterprise ServerSP1, R2, Standard Server,
Standard Server SP1, Standard Server SP1 (x64), Standard Server
SP2, Standard Server SP2 (x64), Standard Server(x64), Storage Server,
Storage Server SP1, Storage Server SP2, Web Server, Web Server SP1,
Web Server SP2

Windows Small Business Server 2003

Premium Edition, Premium Edition R2, Premium Edition SP1, Standard
Edition, Standard Edition R2, Standard Edition SP1, Standard Edition
SP2

Symantec World Headquarters:
20330 Stevens Creek Blvd. Cupertino, CA 95014
World Wide Web: http://www.symantec.com,
Tech Support Web: http://entsupport.symantec.com,
E-Mail Support: http://seer.entsupport.symantec.com/email_forms,
FTP: ftp://ftp.entsupport.symantec.com or
http://ftp.entsupport.symantec.com

THE INFORMATION PROVIDED IN THE SYMANTEC SOFTWARE KNOWLEDGE BASE
IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. SYMANTEC SOFTWARE
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL SYMANTEC SOFTWARE OR ITS SUPPLIERS BE LIABLE FOR
ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,EVEN IF
SYMANTEC SOFTWARE OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION
OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR8dT3Ch9+71yA2DNAQKv0QP+Nu2XO2sBU6iY36ocGOXgLAsISbhQAfQG
9wvuNPVC/rmDAK6Wq+kNcCVLiHPaG9odJzrEfZ6GM4fGHPr1Vv/B2shDNtBb9Ll+
rfwEc2hRswi0s22v6i500qsYKSYXSfQYBQIroEiPtou37mjj3IVwLLjchsaOpXiJ
UJWemPc08ks=
=OYdm
-----END PGP SIGNATURE-----