This module allows arbitrary command execution on an ephemeral port opened by Veritas NetBackup, whilst an administrator is authenticated. The port is opened and allows direct console access as root or SYSTEM from any source address.
The Veritas NetBackup Volume Manager Daemon module is vulnerable to a stack overflow. An attacker can exploit this vulnerability by sending specially crafted data to the daemon, which can lead to remote code execution.
This is a format string exploit for Vertias Netbackup on Win32 systems. The exploit code overwrites either the PEBFastlock or SEH depending on the target system. The exploit is designed for Windows 2000 and Windows XP pre-SP2 for the PEBFastlock overwrite, and Windows XP SP2 for the SEH overwrite. The exploit code is available at the website digitalmunition.com.
This is an exploit for a format string vulnerability in VERITAS NetBackup on Linux/x86. The exploit allows for remote code execution with root privileges. The vulnerability was discovered by kf_lists[at]digitalmunition[dot]com and the exploit was developed by johnh[at]digitalmunition[dot]com. The exploit works by sending a specially crafted request to the target server, triggering the format string vulnerability and executing the provided shellcode.
Multiple unspecified local buffer overrun and format string vulnerabilities have been reported to exist in various setuid Veritas NetBackup binaries. These issues may be exploited to execute arbitrary code with root privileges.
Multiple unspecified local buffer overrun and format string vulnerabilities have been reported to exist in various setuid Veritas NetBackup binaries. These issues may be exploited to execute arbitrary code with root privileges.
Multiple unspecified local buffer overrun and format string vulnerabilities have been reported to exist in various setuid Veritas NetBackup binaries. These issues may be exploited to execute arbitrary code with root privileges.
VERITAS NetBackup is vulnerable to a format string vulnerability on OSX/ppc. This vulnerability can be exploited remotely by sending a specially crafted packet to the NetBackup service. This packet contains a malicious payload which is then executed on the vulnerable system.
A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.