TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo.
from: Geo.
date: 2004-12-23 12:07:42
subject: Re: Backup software

From: "Geo." 

"Geo."  wrote in message
news:41caf52b$1{at}w3.nls.net...
> Successful exploitation does not require authentication thereby allowing
> any remote attacker to execute arbitrary code under the privileges of
> the Backup Exec Agent Browser (benetns.exe) process which is usually a
> domain administrative account.

Oh and as I mentioned in the discussion the other day, exploits for backup
agents yeild root in a way that is just incredibly tempting for virus
writers. What do you suppose a virus writer could do with code running
under a domain admin account that gives him full access not only to every
file on the one machine but to everything on all machines in the domain?

And the best part (I really got a kick out of this) is that BackupExec
folks still don't get it that the agent has to limit access to just the IP
of the backup server and drop traffic from anywhere else without so much as
even looking in the packets. (and that still might not stop a spoofed UDP
based exploit like slammer)

I guarantee, you are looking at the next major infection vector..
backupexec agents. This is a HUGE remote anon exploit.

Geo.

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 396/45 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.