News
News
10/13/2005
02:26 PM
50%
50%

Another Security Flaw Found in Symantec's Veritas Backup

A bug in NetBackup's Java authentication service could allow attackers to run their own code on a target system.

Another vulnerability in Symantec's backup software was made public Wednesday. Although no exploit has yet been seen in Veritas NetBackup, and no increase in port scanning has been tracked, Symantec still urged customers to patch the product as soon as possible.

Versions 4.5, 5.0, 5.1, and 6.0 of NetBackup on all platforms are affected, said Symantec in a security advisory, because of a bug in the Java authentication service "bpjava-msvc." A successful attack against the vulnerability could let an attacker remotely compromise the system, then run his own code on the machine. Danish vulnerability tracker Secunia rated the flaw as "Moderately critical," the middle ranking in its five-step scheme.

Tipping Point, which in July debuted a bounty-for-bug program dubbed "Zero Day Initiative," was credited with the vulnerability's discovery. It first informed Symantec of the problem Sept. 12, Tipping Point said in its own advisory. Patches are available on the Symantec support site, but if they cannot be immediately deployed, the Cupertino, Calif.-based security company recommended that administrators block external network access on TCP port 13722 to stymie any attacks.

Symantec's DeepSight Threat network is keeping watch on that port, but so it's seen no significant increase in scanning.

Still, users should move fast.

"Historically, Veritas software such as Backupexec Server has been heavily targeted by attackers," said Symantec in a DeepSight alert issued Thursday.

As recently as August, another Veritas product, Backup Exec, was found vulnerable to attack. In that case, the flaw was a zero-day vulnerability, meaning an exploit was in circulation before a patch was available. Symantec patched the bug two days later.

In June, Backup Exec was hit with seven vulnerabilities one of which was quickly attacked with an exploit tucked inside the Toxbot bot worm.

Comment  | 
Print  | 
More Insights
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of December 7, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program!
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.