---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_vacancies/ Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/ http://secunia.com/Linux_Security_Specialist/ ---------------------------------------------------------------------- TITLE: CA BrightStor ARCserve Backup MEDIASVR.EXE RPC Request Code Execution SECUNIA ADVISORY ID: SA24682 VERIFY ADVISORY: http://secunia.com/advisories/24682/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From local network SOFTWARE: BrightStor ARCserve Backup 11.x (for Windows) http://secunia.com/product/3099/ BrightStor ARCserve Backup 11.x http://secunia.com/product/312/ BrightStor ARCserve Backup 11.x (for Microsoft SQL Server) http://secunia.com/product/8144/ DESCRIPTION: M. Shirk has discovered a vulnerability in BrightStor ARCserve Backup, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an input validation error within mediasvr.exe when processing 0xBF RPC requests . This can be exploited to execute arbitrary code via a specially crafted 0xBF RPC request sent to the mediasvr.exe process. The vulnerability is confirmed in version r11.5 SP2 build 4237. Other versions may also be affected. SOLUTION: Restrict access to the mediasvr.exe process. PROVIDED AND/OR DISCOVERED BY: M. Shirk ORIGINAL ADVISORY: http://www.shirkdog.us/shk-004.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------