Updating backup exec remote agent guidetoonlinedating com

Rated 4.9/5 based on 926 customer reviews

Please contact secure@if you feel you have discovered a security issue in a Symantec product.A Symantec Product Security team member will contact you regarding your submission.All relevant Symantec Security products have signatures available now.8/15/2005 - Revision Five - Updated Product list Risk Impact High Details Symantec has provided product updates for all supported products affected by a remote access vulnerability allowing unauthorized remote access and the downloading of arbitrary files.

Symantec recommends customers block external access to the service (TCP port 10000) at the network perimeter until they can effectively update their affected systems.

A public exploit has been released to the metasploit framework.

Symantec Man Hunt 3.0 Users of Symantec Manhunt 3.0 can update to the latest Security Update to detect attempts to exploit this vulnerability. Symantec Network Security 7100 Series/4.0 Users of Symantec Network Security 7100 Series/4.0 can update to the latest Security Update to detect attempts to exploit this vulnerability. Symantec Gateway Security 2.0 Users of Symantec Gateway Security 2.0 can update to the latest Security Update to detect attempts to exploit this vulnerability. Symantec Client Security 3.0 Users of Symantec Client Security 3.0 can update to the latest Security Update to detect attempts to exploit this vulnerability. Symantec Response Symantec product engineers quickly validated this issue and delivered fixes and Technical Support documentation for the following supported product versions: VERITAS Backup Exec for Windows Servers VERITAS Backup Exec for Net Ware Servers VERITAS Net Backup for Net Ware Media Server Option Symantec recommends customers immediately apply the latest update for their supported product versions as soon as they are available to protect against these types of threats.

Symantec has developed a Product Vulnerability Response document outlining the process we follow in addressing suspected vulnerabilities in our products. Reprinting the whole or part of this alert in any medium other than electronically requires permission from secure@

Disclaimer The information in the advisory is believed to be accurate at the time of publishing based on currently available information.

Leave a Reply