Vulnerability Note VU#979825

CA BrightStor ARCserve Backup Media Server RPC service buffer overflows

Original Release date: 25 Apr 2007 | Last revised: 25 Apr 2007

Overview

The CA BrightStor ARCserve Backup Media Server contains multiple buffer overflows in the RPC service, which can allow a remote, unauthenticated attacker to execute arbitrary code with elevated privileges.

Description

BrightStor ARCserve Backup is a backup and data retention tool that integrates with other BrightStor Data Availability and BrightStor Storage Management solutions. The BrightStor ARCserve Media Server service, which is provided by mediasvr.exe, contains multiple buffer overflows in the handling of RPC requests. According to the CA security notice, the following products are affected

    BrightStor ARCserve Backup r11.5
    BrightStor ARCserve Backup r11.1
    BrightStor ARCserve Backup r11 for Windows
    BrightStor Enterprise Backup r10.5
    BrightStor ARCserve Backup v9.01
    CA Server Protection Suite r2
    CA Business Protection Suite r2
    CA Business Protection Suite for Microsoft Small Business Server Standard Edition r2
    CA Business Protection Suite for Microsoft Small Business Server Premium Edition r2

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code with elevated privileges.

Solution

Apply an update
According to the CA security notice

    CA has issued the following patches to address the vulnerabilities.

    BrightStor ARCserve Backup r11.5 SP3 - QO87569
    BrightStor ARCserve Backup r11.5 SP2 - QO87570
    BrightStor ARCserve Backup r11.1 - QO87573
    BrightStor ARCserve Backup r11.0 - QI82917
    BrightStor Enterprise Backup r10.5 - QO87575
    BrightStor ARCserve Backup v9.01 - QO87574

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Computer AssociatesAffected-25 Apr 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported by ZDI, who in turn credit Tenable Network Security.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2007-2139
  • Date Public: 24 Apr 2007
  • Date First Published: 25 Apr 2007
  • Date Last Updated: 25 Apr 2007
  • Severity Metric: 9.72
  • Document Revision: 6

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.