Security Advisory SYM09-017 with Symantec Veritas products that contain the VRTSweb component

Article:TECH76711  |  Created: 2009-01-11  |  Updated: 2010-10-16  |  Article URL http://www.symantec.com/docs/TECH76711
Article Type
Technical Solution

Product(s)

Environment

Issue



Security Advisory SYM09-017 with Symantec Veritas products that contain the VRTSweb component


Solution



Symantec Security Advisory
 

 

SYM09-017

December 09, 2009
Symantec Veritas VRTSweb remote code execution/escalation of privilege

Revision History
None

Severity
High

 

Vulnerability Type Affected
Remote Access (Adjacent Network) Yes
Local Access No
Authentication Required No
Exploit publicly available No



Overview
Symantec VRTSweb, a shared component shipped with many Symantec Veritas products, is susceptible to a remote code execution vulnerability.
 

Product Version Platform Solution
Symantec Backup Exec Continuous Protection Server (BE CPS) 11.0, 12.0, and 12.5 All supported platforms Apply Patch or Workaround: http://entsupport.symantec.com/docs/337859
Symantec Veritas NetBackup (NBU) with NetBackup Operations Manager (NOM) installed 6.0.x and 6.5.x Windows and Solaris Apply Workaround: http://entsupport.symantec.com/docs/326110
Symantec Veritas Backup Reporter (VBR) 6.0.x, 6.2.x, 6.5.x, 6.6 Windows and Solaris Apply Workaround: http://entsupport.symantec.com/docs/326110
Symantec Veritas Storage Foundation (SF) 4.1 Linux, 5.0 onwards (AIX, HP-UX, Linux, and Solaris) All supported platforms Apply Patch or Workaround: http://entsupport.symantec.com/docs/337930
Symantec Veritas Storage Foundation for Windows High Availability (SFWHA) 5.0, 5.0RP1a, 5.0RP2 Windows 2000, Windows 2003, and Windows 2008 Apply Patch or Workaround: https://vos.symantec.com/patch/detail/2945
SFWHA continued 5.1 and 5.1AP1 Windows 2000, Windows 2003, and Windows 2008 Apply Patch or Workaround: https://vos.symantec.com/patch/detail/2944
SFWHA continued 4.3 MP2 Windows 2000, Windows 2003, and Windows 2008 For 4.x Releases, apply the workaround mentioned below
Symantec Veritas Storage Foundation for High Availability (SFHA) 4.1 Linux, 5.0 onwards (AIX, HP-UX, Linux, and Solaris) All supported platforms Apply Patch or Workaround: http://entsupport.symantec.com/docs/337930
Symantec Veritas Storage Foundation Manager (SFM) 1.0, 1.1, 1.1.1Ux, 1.1.1Win, 2.0 Solaris 9, Solaris 10, RHEL 5, Windows Server 2003 Standard Server Upgrade to 2.1 or Apply Workaround: http://entsupport.symantec.com/docs/337392
Symantec Veritas Cluster Server (VCS) 4.1 Linux, 5.0 onwards (AIX, HP-UX, Linux, and Solaris) All supported platforms Apply Patch or Workaround: http://entsupport.symantec.com/docs/337930
Symantec Veritas Cluster Server Management Console (VCSMC) 5.0, 5.1, 5.5 All supported platforms Apply Patch or Workaround: http://entsupport.symantec.com/docs/336988
Symantec Veritas Storage Foundation Cluster File System (SFCFS) 4.1 Linux, 5.0 (AIX, HP-UX, Linux, Solaris) Various Apply Patch or Workaround: http://entsupport.symantec.com/docs/337930
Symantec Veritas Application Director (VAD) 1.x, 1.1 PE, 1.1 PE-RPx All supported platforms Apply Patch or Workaround: http://entsupport.symantec.com/docs/337279
Symantec Veritas Cluster Server One (VCSOne) 2.0. 2.0.1, 2.0.2 Solaris 9 and 10, RHEL5 Apply Patch or Workaround: http://entsupport.symantec.com/docs/337279
Symantec Veritas Storage Foundation for Oracle (SFO) 4.1 Linux, 5.0 onwards (AIX, Linux, and Solaris) Various Apply Patch or Workaround: http://entsupport.symantec.com/docs/337930
Symantec Veritas Storage Foundation for DB2 4.1 (Solaris, Linux), 5.0 (Solaris, AIX, and Linux) Various Apply Patch or Workaround: http://entsupport.symantec.com/docs/337930
Symantec Veritas Storage Foundation for Sybase 5.0 Solaris Apply Patch or Workaround: http://entsupport.symantec.com/docs/337930
Symantec Veritas Command Central Storage (CCS) 4.3, 5.0, 5.1 All supported platforms Upgrade to 5.1.1 or Apply Workaround: http://entsupport.symantec.com/docs/337293
Symantec Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, 5.1 All supported platforms Apply Workaround: http://entsupport.symantec.com/docs/337293
Symantec Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1 All supported platforms Upgrade to 5.1.1 or Apply Workaround: http://entsupport.symantec.com/docs/337293
Symantec Veritas MicroMeasure 5 All supported platforms Contact Technical Support


 

NOTE:
 
  • Only the versions listed above are affected.
  • NetBackup is affected only if NetBackup Operations Manager (NOM) is installed.
  • PureDisk is not vulnerable in the default configuration
Details
Symantec was notified of a remote code execution vulnerability in the Symantec VERITAS VRTSweb shared component shipped with multiple Symantec products. This vulnerability is caused by failure to properly validate incoming data over port 14300. An attacker can leverage this issue to execute arbitrary code with administrative privileges on the targeted system.
 

 
Symantec Response
Symantec engineers have verified that the vulnerability exists in all versions of VRTSweb  shipped with products listed above. This vulnerability has been addressed in all supported versions. Symantec engineers did additional reviews, and identified additional areas that could present potential security concerns.

Symantec is not aware of any attempts to exploit this issue, or of any customers impacted by it.

Symantec recommends that customers update affected products (refer the table above for update details) as soon as possible to protect against potential attempts to exploit this issue.


Mitigations/Workarounds

-Block all incoming requests on default port 14300 (or the port that has been configured) on the host in question, except the ones that come from localhost/127.0.0.1, to reduce the risk associated with this vulnerability until the recommended fix is applied.

(or)
 

 
-Shutdown VRTSweb (which will disable web-UI functionality that depends on it) using following commands (without the quotes):
 
(a) "/opt/VRTSweb/bin/webgui stop" on UNIX/Linux
 
(b) "service vrtsweb stop" in cmd shell on Windows
 

Symantec has released an IPS/IDS signature, with id. "23335 TCP VRTSWeb Remote Code Exec", to detect and block attempts to exploit this vulnerability. Signature is available through normal update channels.
 

 
Best Practices
 
As part of normal best practice, Symantec recommends the following:
 
-Turn off file-sharing if not needed. If file sharing is required, use ACLs' and password protection to limit file or folder/directory access. Disable anonymous access to shared folders. Grant access only to user accounts with strong passwords to folders that must be shared.
 

 
-Keep all systems and applications updated with the latest vendor patches. This is especially important on computers that host public services such as HTTP, FTP, DNS and mail.
 

 
-Follow a multi-layered approach to security. Run both firewall and anti-malware applications, at a minimum, to provide multiple points of detection and protection to both inbound and outbound threats.
 

 
-Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in detection of attacks or malicious activity related to exploitation of latent vulnerabilities
 


References
SecurityFocus,  http://www.securityfocus.com/ , has assigned BID 37012 to this issue.

The Common Vulnerabilities and Exposures (CVE),  http://cve.mitre.org, initiative has assigned CVE Candidate number CVE-2009-3027 to this issue.


Credit
An anonymous finder reported this through TippingPoint's ZeroDay Initiative. Symantec would like to thank TippingPoint ZDI for reporting this issue and providing co-ordination while Symantec resolved it.  



     

 



Legacy ID



337115


Article URL http://www.symantec.com/docs/TECH76711


Terms of use for this information are found in Legal Notices