what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CA Security Advisory 34693

CA Security Advisory 34693
Posted Oct 21, 2006
Authored by Ken Williams, Computer Associates | Site ca.com

[CAID 34693, 34694]: CA BrightStor ARCserve Backup Multiple Buffer Overflow Vulnerabilities (UPDATED): Summary: CA BrightStor ARCserve Backup contains multiple buffer overflow conditions that allow remote attackers to execute arbitrary code with local SYSTEM privileges on Windows. These issues affect the BrightStor Backup Agent Service, the Job Engine Service, and the Discovery Service in multiple BrightStor ARCserve Backup application agents and the Base product.

tags | advisory, remote, overflow, arbitrary, local, vulnerability
systems | windows
SHA-256 | aab9553c2355bbb2473b67f29de0eca777c8f03660b498ab0279bf3ed1729b5b

CA Security Advisory 34693

Change Mirror Download

Our original fixes for the BrightStor ARCserve Backup
vulnerabilities that we publicly disclosed on 2006-10-05
(http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93775&date=2006/10)
did not completely resolve one of the vulnerabilities.
Consequently, we have released new fixes that need to be applied.
Please note that these do not replace the original fixes. Both
fixes (each release needs two fixes) need to be applied. A revised
advisory can be found below, and at this link.
http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=94397&date=2006/10



Title: CAID 34693, 34694: CA BrightStor ARCserve Backup Multiple
Buffer Overflow Vulnerabilities (UPDATED)

CA Vulnerability ID (CAID): 34693, 34694

CA Advisory Date: 2006-10-05
CA Revised Advisory Date: 2006-10-19

Discovered By: TippingPoint, www.zerodayinitiative.com

Impact: Remote attacker can execute arbitrary code.

Summary: CA BrightStor ARCserve Backup contains multiple buffer
overflow conditions that allow remote attackers to execute
arbitrary code with local SYSTEM privileges on Windows. These
issues affect the BrightStor Backup Agent Service, the Job Engine
Service, and the Discovery Service in multiple BrightStor ARCserve
Backup application agents and the Base product.

Mitigating Factors: None

Severity: CA has given these vulnerabilities a High risk rating.

Affected Products:
BrightStor Products:
- BrightStor ARCserve Backup r11.5 SP1 and below (SP2 does not
have this vulnerability)
- BrightStor ARCserve Backup r11.1
- BrightStor ARCserve Backup for Windows r11
- BrightStor Enterprise Backup 10.5
- BrightStor ARCserve Backup v9.01
CA Protection Suites r2:
- CA Server Protection Suite r2
- CA Business Protection Suite r2
- CA Business Protection Suite for Microsoft Small Business Server
Standard Edition r2
- CA Business Protection Suite for Microsoft Small Business Server
Premium Edition r2

Affected platforms:
Microsoft Windows

Status and Recommendation:
Customers with vulnerable versions of the BrightStor ARCserve
Backup products should upgrade to the latest versions which are
available for download from http://supportconnect.ca.com.
Solution Document Reference APARs:
QO82860, QO82863, QO82917, QO82856, QO82858

The original fixes did not completely resolve one of the
vulnerabilities. Consequently, an additional fix needs to be
applied. Please note that these do not replace the original fixes.
Both fixes (each release needs two fixes) need to be applied.
Solution Document Reference APARs:
QO83306, QO83307, QO83308, QO83309

Determining if you are affected:
For a list of updated files, and instructions on how to verify
that the security update was fully applied, please review the
Informational Solution referenced in the appropriate Solution
Document.

References (URLs may wrap):
CA SupportConnect:
http://supportconnect.ca.com/
CA SupportConnect Security Notice for this vulnerability:
Important Security Notice for BrightStor ARCserve Backup (Buffer
Overrun)
http://supportconnectw.ca.com/public/storage/infodocs/basbr-secnotice.asp
Solution Document Reference APARs:
QO82860, QO82863, QO82917, QO82856, QO82858, QO83306, QO83307,
QO83308, QO83309
CA Security Advisor Research Blog postings:
http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93775&date=2006/10
http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=94397&date=2006/10
CAID: 34693, 34694
CAID Advisory links:
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34693
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34694
Discoverer: TippingPoint
http://www.tippingpoint.com/security/advisories/TSRT-06-11.html
http://www.tippingpoint.com/security/advisories/TSRT-06-12.html
http://www.zerodayinitiative.com/advisories/ZDI-06-030.html
http://www.zerodayinitiative.com/advisories/ZDI-06-031.html
CVE Reference: CVE-2006-5142, CVE-2006-5143
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5142
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5143
OSVDB References: OSVDB IDs: 29580, 29533, 29534, 29535
http://osvdb.org/29580
http://osvdb.org/29533
http://osvdb.org/29534
http://osvdb.org/29535

Changelog for this advisory:
v1.0 - Initial Release
v2.0 - Advisory updated: new fixes available that must be
installed, IN ADDITION TO the original fixes, to properly
resolve all of the vulnerability issues. Fixed incorrect
blog link. Added OSVDB references.

Customers who require additional information should contact CA
Technical Support at http://supportconnect.ca.com.

For technical questions or comments related to this advisory,
please send email to vuln@ca.com, or contact me directly.

If you discover a vulnerability in CA products, please report
your findings to vuln@ca.com, or utilize our "Submit a
Vulnerability" form.
URL: http://www3.ca.com/securityadvisor/vulninfo/submit.aspx


Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research

CA, One CA Plaza. Islandia, NY 11749

Contact http://www3.ca.com/contact/
Legal Notice http://www3.ca.com/legal/
Privacy Policy http://www3.ca.com/privacy/
Copyright © 2006 CA. All rights reserved.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close