News Analysis

Symantec patches Veritas NetBackup flaw

SearchSecurity.com Staff

Symantec has patched an authentication bypass vulnerability in Veritas NetBackup PureDisk, a backup system for remote offices. In an advisory sent to customers of its DeepSight Threat Management Service, Symantec said attackers could exploit the flaw to bypass the management interface authentication and gain elevated privileges to the affected server.

Attackers could exploit the flaw to gain administrative access to the vulnerable application. "This may allow an attacker to gain administrative privileges on the underlying operating system," Symantec said.

The supplier said the specific problem is that the application fails to properly enforce authentication requirements. However, an attacker must have valid network authentication credentials in order to exploit the flaw.

The security hole affects version 6.0 for all platforms. Danish vulnerability clearinghouse Secunia has rated the flaw "moderately critical," while the French Security Incident Response Team (FrSIRT) has rated it "high risk."

This is Symantec's second fix in as many weeks for products it acquired when it purchased storage supplier Veritas Software in late 2004. Last week, the company addressed security holes in its Backup Exec for Netware Servers.

Two MySQL database flaws are fixed
Researchers have found and fixed two security holes in MySQL, a free SQL database that's available for multiple platforms. Attackers could exploit the flaws to get extra user privileges and bypass security restrictions.

The first problem is that someone who has access to a database but isn't granted the privileges to create new databases can bypass this restriction using the "create database" function. "An attacker can use the name of the database that they have access to but modify it slightly such as using a capital letter in the name to create a new database," Symantec said in a DeepSight Threat management Service advisory. "This bypasses the restriction that prevents the user from creating new databases."

The second problem is that the application incorrectly calculates arguments to the SUID routines in the context of the routines' definer instead of the caller. "A user with privileges to call SUID routines may be able to execute certain commands and code with the privileges of the definer, which can lead to privilege escalation," Symantec said.

The flaws affect MySQL versions 5.0.24 and earlier, have been fixed in the CVS repository and will also be fixed in the upcoming 5.0.25 version.

Study finds many companies have lost laptops
A recent study conducted by the Ponemon Institute and security firm Vontu has found that missing laptops with sensitive data are a far more common problem in corporate America than some might have expected.

Eighty-one percent of respondents admitted losing one or more laptops housing sensitive data in the past year. Nearly 500 IT security professionals participated in the survey.

Many companies are vulnerable to data breaches because they often don't know where their sensitive or confidential data resides within the network or enterprise systems, Ponemon Institute Chairman Larry Ponemon said.

The study also found that portable devices and laptops ranked highest among storage devices that posed the greatest risk for sensitive data, followed by USB keys, desktop systems and shared file servers. Meanwhile, 64% of respondents admitted they've never conducted an inventory of sensitive data.

VA upgrades computer encryption
Following recent data breaches involving the US Department of Veterans' Affairs (VA), the organisation has announced it will upgrade all the agency's computers with a new encryption technology.

The VA plans to have its laptop computers using encryption technology within four weeks, followed by encryption of data on desktop computers, VA Secretary Jim Nicholson told The Associated Press. "A system-wide encryption program will be a tremendous step forward in improving the safety and security of sensitive veteran information," he said.

The encryption follows the award of a $3.7m contract to SMS, the AP noted. The VA will also use GuardianEdge Technologies' and Trust Digital LLC's products.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy