SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Generic)  >   CA ARCserve Backup Vendors:   CA
CA ARCserve Bugs Let Remote Users Execute Arbitrary Code, Bypass Authentication, and Deny Service
SecurityTracker Alert ID:  1018728
SecurityTracker URL:  http://securitytracker.com/id/1018728
CVE Reference:   CVE-2007-3216, CVE-2007-5003, CVE-2007-5004, CVE-2007-5005, CVE-2007-5006   (Links to External Site)
Date:  Sep 21 2007
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): CA ARCserve Backup for Laptops and Desktops 4.0, 11.0, 11.1, 11.1 SP1, 11.1 SP2, 11.5
Description:   A vulnerability was reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system, bypass authentication, or cause denial of service conditions.

A remote user can send specially crafted data to execute arbitrary code or cause denial of service conditions on the target system. The code will run with the privileges of the target service.

Several command arguments processed by the LGServer service are affected [CVE-2007-3216].

rxrLogin authentication credentials and a username value processed by the GetUserInfo() function are affected [CVE-2007-5003].

An integer overflow exists in the processing of authentication information [CVE-2007-5004].

File uploads are not properly validated by the NetBackup service [CVE-2007-5005].

A remote user can supply specially crafted authorization credentials to bypass authentication [CVE-2007-5006].

Client installations are not affected.

CA Desktop Management Suite versions 11.0, 11.1, and 11.2 are also affected.

CA Protection Suites r2 is also affected.

eEye Digital Security, Sean Larsson of VeriSign iDefense Labs, and some anonymous researchers working with iDefense reported these vulnerabilities.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can cause denial of service conditions.

A remote user can bypass authentication.

Solution:   The vendor has issued the following fixes.

CA ARCserve Backup for Laptops and Desktops (BMB) r4.0:
QO91013
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91013

CA ARCserve Backup for Laptops and Desktops 11.1:
QO91014
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91014

CA Desktop Management Suite 11.1:
QO91016
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91016

CA Desktop Management Suite 11.2 English:
QO91110
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91110

CA ARCserve Backup for Laptops and Desktops 11.5:
QO91015
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91015

CA Desktop Management Suite 11.2 localized:
QO91111
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO91111

The CA advisory is available at:

http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp

Vendor URL:  supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp (Links to External Site)
Cause:   Boundary error, Input validation error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC