---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/ The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: CA BrightStor ARCserve Backup Media Server Multiple Buffer Overflows SECUNIA ADVISORY ID: SA24972 VERIFY ADVISORY: http://secunia.com/advisories/24972/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From local network SOFTWARE: BrightStor ARCserve Backup 11.x http://secunia.com/product/312/ BrightStor ARCserve Backup 11.x (for Microsoft SQL Server) http://secunia.com/product/8144/ BrightStor ARCserve Backup 11.x (for Windows) http://secunia.com/product/3099/ BrightStor ARCserve Backup 9.x http://secunia.com/product/313/ BrightStor Enterprise Backup 10.x http://secunia.com/product/314/ DESCRIPTION: Some vulnerabilities have been reported in BrightStor ARCserve Backup, which can be exploited by malicious people to compromise a vulnerable system. The vulnerabilities are caused due to boundary errors within the SUN RPC service when processing RPC strings. These can be exploited to cause stack-based buffer overflows via specially crafted RPC strings sent to the service. Successful exploitation allows execution of arbitrary code. The vulnerabilities affect the following products and versions: * BrightStor ARCserve Backup r11.5 * BrightStor ARCserve Backup r11.1 * BrightStor ARCserve Backup r11 for Windows * BrightStor Enterprise Backup r10.5 * BrightStor ARCserve Backup v9.01 * CA Server Protection Suite r2 * CA Business Protection Suite r2 * CA Business Protection Suite for Microsoft Small Business Server Standard Edition r2 * CA Business Protection Suite for Microsoft Small Business Server Premium Edition r2 SOLUTION: Apply patches. BrightStor ARCserve Backup r11.5 SP3 - QO87569: http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO87569 BrightStor ARCserve Backup r11.5 SP2 - QO87570: http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO87570 BrightStor ARCserve Backup r11.1 - QO87573: http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO87573 BrightStor ARCserve Backup r11.0 - QI82917: http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QI82917 BrightStor Enterprise Backup r10.5 - QO87575: http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO87575 BrightStor ARCserve Backup v9.01 - QO87574: http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO87574 PROVIDED AND/OR DISCOVERED BY: Discovered by Tenable Network Security and reported via ZDI. ORIGINAL ADVISORY: CA: http://supportconnectw.ca.com/public/storage/infodocs/babmedser-secnotice.asp ZDI: http://www.zerodayinitiative.com/advisories/ZDI-07-022.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------