cancel
Showing results for 
Search instead for 
Did you mean: 

Document ID: 278434 - BE 8.6 Patch

David_Wild
Level 2
http://support.veritas.com/docs/278434

The details section of this technote suggests a patch for BE 8.6 to rectify this problem but does not offer one!

Can anyone shed any light on this?
2 REPLIES 2

Renuka_-
Level 6
Employee
Hello,

There is infact NO patch offered in any portion of this technote for Version 8.6. In fact to quote from the technote ITSELF:


Note: Those with Backup Exec 8.6 for Windows Servers will need to either upgrade to a newer version or rely on the workaround.

Workaround Information:
To avoid the issue, implement any of the following workarounds:

* Block external access at the network boundary, unless service is required by external parties
* Block external access to the service (TCP port 10000) at the network perimeter. Permit access for trusted or internal computers and networks only
* Deploy network intrusion detection systems to monitor network traffic for malicious activity
* Deploy network intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in detection of attacks or malicious activity related to exploitation of latent vulnerabilities.

Please use the advice quoted here from the same technote.


Additional Information :
For information on the recent VERITAS Backup Exec security vulnerabilities, including links to the downloads for the necessary hotfixes, please refer to the following document:
Patch summary for Security Advisories VX05-001, VX05-002, VX05-003, VX05-005, VX05-006, VX05-007

http://seer.support.veritas.com/docs/277429.htm

NOTE : If we do not receive your reply within two business days, this post would be marked assumed answeredand would be moved toanswered questions pool.

David_Wild
Level 2
Thankyou, an upgrade may be in order!