Vulnerability Details : CVE-2006-6222
Stack-based buffer overflow in the NetBackup bpcd daemon (bpcd.exe) in Symantec Veritas NetBackup 5.0 before 5.0_MP7, 5.1 before 5.1_MP6, and 6.0 before 6.0_MP4 allows remote attackers to execute arbitrary code via a long request with a malformed length prefix.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-6222
- cpe:2.3:a:symantec:veritas_netbackup_client:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:veritas_netbackup_client:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:veritas_netbackup_client:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:veritas_netbackup_enterprise_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:veritas_netbackup_enterprise_server:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:veritas_netbackup_enterprise_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:veritas_netbackup_server:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:veritas_netbackup_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:veritas_netbackup_server:5.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6222
38.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6222
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2006-6222
-
http://secunia.com/advisories/23368
Patch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2006/4999
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30882
-
http://www.zerodayinitiative.com/advisories/ZDI-06-049.html
Vendor Advisory
-
http://www.kb.cert.org/vuls/id/607312
Patch;US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30883
-
http://www.securityfocus.com/bid/21565
Patch
-
http://www.securityfocus.com/archive/1/454313/100/0/threaded
-
http://www.symantec.com/avcenter/security/Content/2006.12.13a.html
Patch
-
http://securitytracker.com/id?1017379
Patch
-
http://securityreason.com/securityalert/2033
Jump to