APP: Symantec Veritas Storage Foundation Scheduler Service NULL Session Authentication Bypass
This signature detects attempts to exploit a known vulnerability against Veritas backup packages. Attackers using an out-of-range TimeStamp CONFIG message can create a denial-of-service condition on the affected system.
Extended Description
Symantec Storage Foundation for Windows is prone to a vulnerability that lets attackers circumvent security updates. The issue resides in the Volume Manager Scheduler Service. Successful exploits of this issue allow attackers to circumvent a previous security update that resolved authentication-bypass and remote code-execution vulnerabilities. This may facilitate the complete compromise of affected computers. Storage Foundation 5.0, 5.0 RP1, and 5.1 are vulnerable.
Affected Products
Symantec storage_foundation_for_windows
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Symantec
10.0
5.0