Computer Associates Arcserve Buffer Overflow Vulnerability

Published: 2007-01-11. Last Updated: 2007-01-11 21:51:28 UTC
by Adrien de Beaupre (Version: 1)
0 comment(s)
Computer Associates today released an advisory and patch that deals with a remotely exploitable bug in CA BrightStor ARCserve Backup tape engine.  From TippingPoint's Zero Day Initiative site:
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Backup. User interaction is not required to exploit this vulnerability.

The specific flaw exists in the Tape Engine RPC service which listens by default on TCP port 6503 with the following UUID:

    2b93df0-8b02-11ce-876c-00805f842837

The service exposes a buffer overflow in the handler for RPC opnum 0xCF that allows for arbitrary code execution when handling user-supplied data from the RPC request.
Since the service runs on Windows as LOCAL_SYSTEM, an attacker exploiting this vuln could have complete unrestricted control over the victim.

Versions of Arcserve up to and including version 11.5 are vulnerable and admins should visit http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp to pull down the vendor supplied fix.

Question for the community: Is anyone running Arcserve in an enterprise environment *without* running the service as LOCAL_SYSTEM?
Keywords:
0 comment(s)

Comments


Diary Archives