10.0
CRITICAL
CVE-2009-3027
Symantec Backup Exec Continuous Protection Server VRTSweb.exe Remote Code Execution Vulnerability
Description

VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.

INFO

Published Date :

Dec. 11, 2009, 4:30 p.m.

Last Modified :

Oct. 10, 2018, 7:42 p.m.

Remotely Exploitable :

Yes !

Impact Score :

10.0

Exploitability Score :

10.0
Affected Products

The following products are affected by CVE-2009-3027 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Symantec veritas_storage_foundation
2 Symantec veritas_storage_foundation_cluster_file_system_for_oracle_rac
3 Symantec veritas_backup_exec
4 Symantec backup_exec_continuous_protection_server
5 Symantec veritas_application_director
6 Symantec veritas_cluster_server
7 Symantec veritas_cluster_server_management_console
8 Symantec veritas_cluster_server_one
9 Symantec veritas_command_central_enterprise_reporter
10 Symantec veritas_command_central_storage
11 Symantec veritas_command_central_storage_change_manager
12 Symantec veritas_micromeasure
13 Symantec veritas_netbackup_operations_manager
14 Symantec veritas_netbackup_reporter
15 Symantec veritas_storae_foundation
16 Symantec veritas_storage_foundation_cluster_file_system
17 Symantec veritas_storage_foundation_for_db2
18 Symantec veritas_storage_foundation_for_high_availability
19 Symantec veritas_storage_foundation_for_oracle
20 Symantec veritas_storage_foundation_for_oracle_real_application_cluster
21 Symantec veritas_storage_foundation_for_sybase
22 Symantec veritas_storage_foundation_for_windows_high_availability
23 Symantec veritas_storage_foundation_manager
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2009-3027.

URL Resource
http://marc.info/?l=bugtraq&m=126046186917330&w=2 Patch
http://secunia.com/advisories/37631 Vendor Advisory
http://secunia.com/advisories/37637 Vendor Advisory
http://secunia.com/advisories/37685 Vendor Advisory
http://securitytracker.com/id?1023309
http://securitytracker.com/id?1023312
http://seer.entsupport.symantec.com/docs/336988.htm Patch Vendor Advisory
http://seer.entsupport.symantec.com/docs/337279.htm Patch Vendor Advisory
http://seer.entsupport.symantec.com/docs/337293.htm Patch Vendor Advisory
http://seer.entsupport.symantec.com/docs/337392.htm Patch Vendor Advisory
http://seer.entsupport.symantec.com/docs/337859.htm Patch Vendor Advisory
http://seer.entsupport.symantec.com/docs/337930.htm Patch Vendor Advisory
http://www.osvdb.org/60884
http://www.securityfocus.com/archive/1/508358/100/0/threaded
http://www.securityfocus.com/bid/37012
http://www.securitytracker.com/id?1023311
http://www.securitytracker.com/id?1023313
http://www.securitytracker.com/id?1023318
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091209_00
http://www.vupen.com/english/advisories/2009/3467 Vendor Advisory
http://www.vupen.com/english/advisories/2009/3483 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-09-098/ Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/54665
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2009-3027 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2009-3027 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Oct. 10, 2018

    Action Type Old Value New Value
    Removed Reference http://www.securityfocus.com/archive/1/archive/1/508358/100/0/threaded [No Types Assigned]
    Added Reference http://www.securityfocus.com/archive/1/508358/100/0/threaded [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 19, 2017

    Action Type Old Value New Value
    Removed Reference http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7986 [No Types Assigned]
    Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 17, 2017

    Action Type Old Value New Value
    Removed Reference http://xforce.iss.net/xforce/xfdb/54665 [No Types Assigned]
    Added Reference https://exchange.xforce.ibmcloud.com/vulnerabilities/54665 [No Types Assigned]
  • Initial Analysis by [email protected]

    Dec. 14, 2009

    Action Type Old Value New Value
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2009-3027 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

89.70 }} 1.01%

score

0.98885

percentile

CVSS2 - Vulnerability Scoring System
Access Vector
Access Complexity
Authentication
Confidentiality
Integrity
Availability