Korean
<< Back
VID 23128
Severity 40
Port 20031
Protocol TCP
Class NetVault
Detailed Description The BakBone NetVault, according to its version number, has two heap buffer overflow vulnerabilities. NetVault is a tape backup system for various operating systems. NetVault versions 7.3 and earlier could allow a local or remote attacker to execute arbitrary code on the affected host.

1) Local Overflow: A vulnerability exists in the processing of the 'configure.cfg' file. A local user with access to the file can create a computername 'Name=' entry that is longer than 111 bytes. Then, when the NetVault Process Manager service starts (or restarts), a buffer overflow will be triggered and arbitrary code executed with System privileges. The default permissions of the file are read only for the Users group.
2) Remote overflow: A remote user can connect to the target system on port 20031 and supply a specially crafted 'clientname' entry in the 'Available NetVault Machines' list to trigger a heap overflow and execute arbitrary code on the target server.

* Note: This check solely relied on the version number of the BakBone NetVault service to assess this vulnerability, so this might be a false positive.

* References:
http://class101.org/netv-remhbof.pdf
http://class101.org/netv-locsbof.pdf
http://www.securitytracker.com/alerts/2005/Apr/1013625.html
http://www.hat-squad.com/en/000164.html
http://www.securityfocus.com/data/vulnerabilities/exploits/netvault_hof.c

* Platforms Affected:
BakBone, NetVault versions 7.3 and earlier
Any operating system Any version
Recommendation No upgrade or patch available as of May 2005.

Upgrade to the latest version of NetVault (7.3 later), when new version fixed this problem becomes available from the NetVault Download Web page at http://www.bakbone.com/products/downloads/
Related URL CVE-2005-1009 (CVE)
Related URL 12967,13618 (SecurityFocus)
Related URL 19932 (ISS)