Overview
Veritas NetBackup Administrative Assistant interface may allow users to execute arbitrary commands with elevated privileges.
Description
| The Veritas NetBackup Administrative Assistant interface (bpjava-susvc) contains an input validation vulnerability. According to Veritas Alert 271727 : When the NetBackup Administrative Java GUI connects to a NetBackup server (either a master or media server) a process is started on the server called bpjava-susvc.  A normal user with access to this server could send specially crafted commands to this process and have those commands executed with root authority. 
 | 
Impact
| If an attacker supplies a vulnerable NetBackup server with specially crafted commands, those commands may be executed with elevated (possibly root) privileges. | 
Solution
| Apply Patch 
 This issue will be fixed in Veritas NetBackup version 6. | 
| Workaround 
 
 # An example: "C:\\Program Files\\VERITAS\\java" SET INSTALL_PATH=C:\\Program Files\\VERITAS\\\\Java SET SERVER_HOST=master.min.veritas.com SET NBJAVA_CONNECT_OPTION=1 Partial sample of a UNIX /usr/openv/java/nbj.conf file: 
 #bcpyrght #*************************************************************************** #* $VRTScprght: Copyright 1993 - 2003 VERITAS Software Corporation, All Rights Reserved $ * #*************************************************************************** #ecpyrght BPJAVA_PORT=13722 VNETD_PORT=13724 NBJAVA_CONNECT_OPTION=1 | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was reported in Veritas Alert 271727.
This document was written by Jeff Gennari.
Other Information
| CVE IDs: | None | 
| Severity Metric: | 3.65 | 
| Date Public: | 2004-10-20 | 
| Date First Published: | 2005-01-18 | 
| Date Last Updated: | 2005-04-20 14:48 UTC | 
| Document Revision: | 55 |