6.5
CVE-2006-4128
- EPSS 18.26%
- Published 14.08.2006 23:04:00
- Last modified 03.04.2025 01:03:51
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Multiple heap-based buffer overflows in Symantec VERITAS Backup Exec for Netware Server Remote Agent for Windows Server 9.1 and 9.2 (all builds), Backup Exec Continuous Protection Server Remote Agent for Windows Server 10.1 (builds 10.1.325.6301, 10.1.326.1401, 10.1.326.2501, 10.1.326.3301, and 10.1.327.401), and Backup Exec for Windows Server and Remote Agent 9.1 (build 9.1.4691), 10.0 (builds 10.0.5484 and 10.0.5520), and 10.1 (build 10.1.5629) allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RPC message.
Data is provided by the National Vulnerability Database (NVD)
Symantec Veritas ≫ Backup Exec Version9.1 Editionwindows_server_remote_agent
Symantec Veritas ≫ Backup Exec Version9.1_build9.1.4691 Editionwindows_server_remote_agent
Symantec Veritas ≫ Backup Exec Version9.2 Editionwindows_server_remote_agent
Symantec Veritas ≫ Backup Exec Version10.0 Editionwindows_server_remote_agent
Symantec Veritas ≫ Backup Exec Version10.0_build10.0.5484 Editionwindows_server_remote_agent
Symantec Veritas ≫ Backup Exec Version10.0_build10.0.5520 Editionwindows_server_remote_agent
Symantec Veritas ≫ Backup Exec Version10.1 Editionwindows_server_remote_agent
Symantec Veritas ≫ Backup Exec Version10.1.325.6301
Symantec Veritas ≫ Backup Exec Version10.1.326.1401
Symantec Veritas ≫ Backup Exec Version10.1.326.2501
Symantec Veritas ≫ Backup Exec Version10.1.326.3301
Symantec Veritas ≫ Backup Exec Version10.1.327.401
Symantec Veritas ≫ Backup Exec Version10.1_build10.1.5629 Editionwindows_server_remote_agent
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 18.26% | 0.947 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|