Vulnerability Note VU#408099

CA ARCserve Backup authentication service denial-of-service vulnerability

Original Release date: 30 Oct 2012 | Last revised: 30 Oct 2012

Overview

The CA ARCserve Backup authentication service, caauthd.exe, is susceptible to a denial-of-service vulnerability. CA ARCserve Backup r16 SP1 was reported to be vulnerable.

Description

The Offensive Security advisory states:

    By specifying an invalid field size for the encrypted username or password in a crafted RPC packet, the authentication service performs an invalid pointer dereference while trying to decrypt the character string. Authentication is not required to trigger the vulnerability and successful exploitation of this vulnerability for the caauthd.exe process will lead to a denial of service.

Additional details may be found in CA20121018-01: Security Notice for CA ARCserve Backup.

Impact

An unauthenticated remote attacker may be able to trigger a denial-of-service condition.

Solution

Apply a Patch

  • CA ARCserve Backup for Windows r12.5 apply patch RO49917
  • CA ARCserve Backup for Windows r15 apply patch RO49916
  • CA ARCserve Backup for Windows r16 apply patch RO49750

If you cannot patch for whatever reason please consider the following workarounds.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
CA TechnologiesAffected11 Jul 201231 Aug 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 7.8 AV:N/AC:L/Au:N/C:N/I:N/A:C
Temporal 6.1 E:POC/RL:OF/RC:C
Environmental 6.1 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Matteo Memelli of Offensive Security for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs: CVE-2012-2972
  • Date Public: 31 Aug 2012
  • Date First Published: 30 Oct 2012
  • Date Last Updated: 30 Oct 2012
  • Document Revision: 22

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.