The CA ARCserve Backup authentication service, caauthd.exe, is susceptible to a pre-authentication remote code execution vulnerability. Arbitrary code will run with NT AUTHORITY\SYSTEM privileges. CA ARCserve Backup r16 SP1 was reported to be vulnerable.
The Offensive Security advisory states:
By replacing a particular xdr_rwslist object expected in an RPC authentication packet (opcode 0x7a) with another xdr_rwobject, function sub_416E80 will call a non-existent or invalid virtual function (RWSlistCollectables::at) that can be controlled by the attacker. Authentication is not required to trigger the bug and successful exploitation of this vulnerability for the caauthd.exe process will lead to remote code execution with NT AUTHORITY\SYSTEM privileges. Failed exploitation will lead to a denial of service.
An unauthenticated attacker may be able to execute remote code with NT AUTHORITY\SYSTEM privileges.
Apply a Patch
If you cannot patch for whatever reason please consider the following workarounds.
Thanks to Matteo Memelli of Offensive Security for reporting this vulnerability.
This document was written by Jared Allar.
|Date First Published:||2012-10-30|
|Date Last Updated:||2012-10-30 20:06 UTC|