SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   CA ARCserve Backup Vendors:   CA
CA BrightStor ARCserve RPC Processing Bugs Let Remote Users Deny Service and Execute Arbitrary Code
SecurityTracker Alert ID:  1017783
SecurityTracker URL:  http://securitytracker.com/id/1017783
CVE Reference:   CVE-2007-1447, CVE-2007-1448   (Links to External Site)
Date:  Mar 16 2007
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.01, 10.5, 11, 11.1, 11.5
Description:   A vulnerability was reported in BrightStor ARCserve. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

A remote user can send specially crafted RPC data to trigger a memory corruption error and execute arbitrary code on the target system [CVE-2007-1447]. The code will run with the privileges of the target service.

A remote user can send specially crafted data to invoke an RPC function that will disable the Tape Engine interface [CVE-2007-1448].

The CA Protection Suite is also affected.

McAfee discovered this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can cause denial of service conditions.

Solution:   The vendor has issued the following fixes, available at:

http://supportconnect.ca.com

BrightStor ARCserve Backup r11.5 - QO86255
BrightStor ARCserve Backup r11.1 - QO86258
BrightStor ARCserve Backup r11.0 - QI82917
BrightStor Enterprise Backup r10.5 - QO86259
BrightStor ARCserve Backup v9.01 - QO86260

The CA advisory is available at:

http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp

Vendor URL:  supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [CAID 34817, 35058, 35158, 35159]: CA BrightStor ARCserve Backup Tape Engine and Portmapper Vulnerabilities

Title: [CAID 34817, 35058, 35158, 35159]: CA BrightStor ARCserve 
Backup Tape Engine and Portmapper Vulnerabilities

CA Vuln ID (CAID): 34817, 35058, 35158, 35159

CA Advisory Date: 2007-03-15

Reported By: McAfee

Impact: Remote attackers can cause a denial of service or 
potentially execute arbitrary code.

Summary: CA BrightStor ARCserve Backup contains four 
vulnerabilities that can allow a remote attacker to cause a denial 
of service or possibly execute arbitrary code. CA has issued 
patches to address the vulnerabilities. The first vulnerability, 
CVE-2006-6076, is due to insufficient bounds checking in the Tape 
Engine, which can result in a buffer overflow and arbitrary code 
execution. The second vulnerability, CVE-2007-0816, is related to 
how invalid parameters are handled by the portmapper (catirpc.dll) 
service. By sending a specially crafted request, a remote attacker 
can crash the service. The third vulnerability, CVE-2007-1447, is 
due to a memory corruption issue that occurs during processing of 
RPC procedure arguments by the Tape Engine. The vulnerability can 
result in a denial of service, and can potentially be exploited to 
execute arbitrary code. The fourth vulnerability, CVE-2007-1448, 
is due to the presence of an RPC function that, when called, will 
disable the Tape Engine interface. A remote attacker can make a 
request that will effectively shut down Tape Engine functionality.

Mitigating Factors: None

Severity: CA has given these vulnerabilities a High risk rating.

Affected Products:
BrightStor Products:
   BrightStor ARCserve Backup r11.5
   BrightStor ARCserve Backup r11.1
   BrightStor ARCserve Backup for Windows r11
   BrightStor Enterprise Backup r10.5
   BrightStor ARCserve Backup v9.01
CA Protection Suites r2:
   CA Server Protection Suite r2
   CA Business Protection Suite r2
   CA Business Protection Suite for Microsoft Small Business 
      Server Standard Edition r2
   CA Business Protection Suite for Microsoft Small Business 
      Server Premium Edition r2

Affected Platforms:
Windows

Status and Recommendation:
Customers using vulnerable versions of BrightStor ARCserve Backup 
should upgrade with the latest patches, which are available for 
download from http://supportconnect.ca.com.
BrightStor ARCserve Backup r11.5 - QO86255
BrightStor ARCserve Backup r11.1 - QO86258
BrightStor ARCserve Backup r11.0 - QI82917
BrightStor Enterprise Backup r10.5 - QO86259
BrightStor ARCserve Backup v9.01 - QO86260

How to determine if the installation is affected:
1. Using Windows Explorer, locate the files "tapeng.dll" and 
   "catirpc.dll". By default, the files are located in the 
   "C:\Program Files\CA\BrightStor ARCserve Backup" directory.
2. Right click on each of the files and select Properties.
3. Select the General tab.
4. If either file timestamp is earlier than what is indicated in 
   the table below, the installation is vulnerable.

File Name      Timestamp              File Size
catirpc.dll    02/12/2007 10:55:14    102400 bytes
tapeeng.dll    02/02/2007 17:05:00    876627 bytes

Workaround:
To reduce exposure, block unauthorized access to ports 6502 (TCP) 
and 111 (UDP).

References (URLs may wrap):
CA SupportConnect:
http://supportconnect.ca.com/
CA SupportConnect Security Notice for this vulnerability:
Security Notice for BrightStor ARCserve Backup Tape Engine and 
   Portmapper
http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp
Solution Document Reference APARs:
QO86255, QO86258, QI82917, QO86259, QO86260
CA Security Advisor posting:
CA BrightStor ARCserve Backup Tape Engine and Portmapper 
   Vulnerabilities
http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317
CAID: 34817, 35058, 35158, 35159
CAID Advisory links:
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34817
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35058
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35158
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35159
Reported By: McAfee
McAfee advisory:
http://www.mcafee.com/us/threat_center/security_advisories.html
CVE References: CVE-2006-6076, CVE-2007-0816, CVE-2007-1447, 
   CVE-2007-1448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6076
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0816
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1448
OSVDB Reference: OSVDB-32989, OSVDB-32990, OSVDB-32991, 
   OSVDB-30637
http://osvdb.org/32989
http://osvdb.org/32990
http://osvdb.org/32991
http://osvdb.org/30637

Changelog for this advisory:
v1.0 - Initial Release

Customers who require additional information should contact CA
Technical Support at http://supportconnect.ca.com.

For technical questions or comments related to this advisory, please
send email to vuln AT ca DOT com.

If you discover a vulnerability in CA products, please report your
findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability"
form. 
URL: http://www3.ca.com/securityadvisor/vulninfo/submit.aspx


Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research

CA, One CA Plaza, Islandia, NY 11749
	
Contact http://www3.ca.com/contact/
Legal Notice http://www3.ca.com/legal/
Privacy Policy http://www3.ca.com/privacy/
Copyright (c) 2007 CA. All rights reserved.
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC