---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: CA BrightStor ARCServe Backup Multiple Vulnerabilities SECUNIA ADVISORY ID: SA27192 VERIFY ADVISORY: http://secunia.com/advisories/27192/ CRITICAL: Moderately critical IMPACT: Security Bypass, DoS, System access WHERE: >From remote SOFTWARE: BrightStor ARCserve Backup 11.x http://secunia.com/product/312/ BrightStor ARCserve Backup 11.x (for Windows) http://secunia.com/product/3099/ BrightStor Enterprise Backup 10.x http://secunia.com/product/314/ BrightStor ARCserve Backup 9.x http://secunia.com/product/313/ DESCRIPTION: Multiple vulnerabilities have been reported in CA BrightStor ARCserve Backup, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or compromise a vulnerable system. 1) Multiple boundary errors in various components (e.g. Message Engine, AScore.dll, rpcx.dll) when handling RPC requests can be exploited to cause buffer overflows. 2) Multiple errors in various components (e.g. dbasvr, lqserver, mediasvr, callogerd) can be exploited to cause a memory corruption. Successful exploitation of these vulnerabilities allow execution of arbitrary code. 3) Improper authentication checks on certain unspecified functions can be exploited to perform privileged actions on the system. The vulnerabilities are reported in the following products: * BrightStor ARCserve Backup r11.5 * BrightStor ARCserve Backup r11.1 * BrightStor ARCserve Backup r11 for Windows * BrightStor Enterprise Backup r10.5 * BrightStor ARCserve Backup v9.01 * CA Server Protection Suite r2 * CA Business Protection Suite r2 * CA Business Protection Suite for Microsoft Small Business Server Standard Edition r2 * CA Business Protection Suite for Microsoft Small Business Server Premium Edition r2 SOLUTION: Apply updates. BrightStor ARCserve Backup r11.5 (QO91094): http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91094 BrightStor ARCserve Backup r11.1 (QO91097): http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91097 BrightStor ARCserve Backup r11.0: Upgrade to 11.1 and apply the latest patches. BrightStor Enterprise Backup r10.5: Upgrade to 11.5 and apply the latest patches. BrightStor ARCserve Backup v9.01 (QO91098): http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91098 CA Protection Suites r2 (QO91094): http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91094 PROVIDED AND/OR DISCOVERED BY: 1) Independently discovered by: * An anonymous researcher, reported via iDefense Labs * Dyon Balding, Secunia Research * cocoruder, Fortinet Security Research Team 2) Independently discovered by: * Pedram Amini, TippingPoint DV Labs * Dyon Balding, Secunia Research * eEye Digital Security * shirkdog 3) The vendor credits Tenable Network Security. ORIGINAL ADVISORY: CA: http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp Secunia Research: http://secunia.com/secunia_research/2007-49/advisory/ http://secunia.com/secunia_research/2007-62/advisory/ http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066528.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------