Security Advisory SYM09-017 Backup Exec Continuous Protection Server (CPS) patches for Symantec Veritas VRTSweb component
Symantec VRTSweb, a shared component shipped with many Symantec Veritas products, is susceptible to a remote code-execution vulnerability. This vulnerability is caused by the improper validation of incoming data over port 14300.
This alert is being issued in conjunction with a Security Advisory, which is available at the following location: http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091209_00
What is Affected:
Backup Exec Continuous Protection Server (CPS) 11d
Backup Exec Continuous Protection Server (CPS) 12.0
Backup Exec Continuous Protection Server (CPS) 12.5
How to Determine if Affected:
This issue will be visible on a server running CPS 11d, 12.0 and 12.5 along with the Symantec Veritas VRTSweb component. The CPS server with this component installed will have a "Symantec Web Server Service" displayed in the Services console.
This issue is formally resolved in the following hotfixes:
Backup Exec Continuous Protection Server (CPS) 11d:
Backup Exec Continuous Protection Server (CPS) 12.0:
Backup Exec Continuous Protection Server (CPS) 12.5:
To resolve this issue, apply the respective patch for your environment. If the hotfix cannot be applied at this time, Symantec strongly recommends implementing the Workaround listed in the next section until the patch can be applied to the environment.
-Shutdown VRTSweb (which will disable web-UI functionality that depends on it) using following commands:
Windows: From the command shell: service vrtsweb stop
Symantec strongly recommends the following best practices:
1. Always perform a full backup prior to and after any changes to your environment.
2. Always make sure that your environment is running the latest version and patch level.
3. Perform periodic "test" restores.
4. Subscribe to technical articles.
How to Subscribe to Email Notification:
Subscribe to this TechNote for any updates that are made to this article, by clicking on the following link: http://maillist.support.veritas.com/notification.asp?doc=337859
If you have not received this from the Symantec Technical Support Email Notification Service, please click on the following link to subscribe to future Notifications: