lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 26 Apr 2007 01:47:50 -0400
From: "Williams, James K" <James.Williams@...com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: [CAID 35198,
	35276]: CA BrightStor ARCserve Backup Media Server Vulnerabilities


Title: [CAID 35198, 35276]: CA BrightStor ARCserve Backup Media 
Server Vulnerabilities

CA Vuln ID (CAID): 35198, 35276

CA Advisory Date: 2007-04-24

Reported By: ZDI

Impact: Remote attackers can cause a denial of service or 
potentially execute arbitrary code.

Summary: CA BrightStor ARCserve Backup Media Server contains 
multiple vulnerabilities that can allow a remote attacker to cause 
a denial of service or possibly execute arbitrary code. CA has 
issued patches to address the vulnerabilities. The first 
vulnerability, CVE-2007-1785, addresses an issue with the 
processing of an object handle. The second vulnerability, 
CVE-2007-2139, is due to insufficient bounds checking. In both 
cases, a remote unauthenticated attacker can execute arbitrary 
code with escalated privileges.

Mitigating Factors: None

Severity: CA has given these vulnerabilities a High risk rating.

Affected Products:
BrightStor Products:
BrightStor ARCserve Backup r11.5
BrightStor ARCserve Backup r11.1
BrightStor ARCserve Backup for Windows r11
BrightStor Enterprise Backup r10.5
BrightStor ARCserve Backup v9.01
CA Protection Suites r2:
CA Server Protection Suite r2
CA Business Protection Suite r2
CA Business Protection Suite for Microsoft Small Business Server 
   Standard Edition r2
CA Business Protection Suite for Microsoft Small Business Server 
   Premium Edition r2

Affected Platforms:
Windows

Status and Recommendation:
Customers using vulnerable versions of BrightStor ARCserve Backup 
should upgrade with the latest patches, which are available for 
download from http://supportconnect.ca.com.
BrightStor ARCserve Backup r11.5 SP3 - QO87569
BrightStor ARCserve Backup r11.5 SP2 - QO87570
BrightStor ARCserve Backup r11.1 - QO87573
BrightStor ARCserve Backup r11.0 - QI82917
BrightStor Enterprise Backup r10.5 - QO87575
BrightStor ARCserve Backup v9.01 - QO87574

How to determine if the installation is affected:
1. Using Windows Explorer, locate the file "mediasvr.exe".
2. By default, the file is located in the 
   "C:\Program Files\CA\BrightStor ARCserve Backup" directory.
3. Right click on the file and select Properties.
4. Select the General tab.
5. If the file timestamp is earlier than indicated in the table 
   below, the installation is vulnerable.

Product Version  File Name     Timestamp            File Size
r11.5 SP3        mediasvr.exe  04/03/2007 10:07:58  110592
r11.5 SP2        mediasvr.exe  04/03/2007 10:00:04  106496
r11.1            mediasvr.exe  04/03/2007 09:55:18  106496
r10.5            mediasvr.exe  04/03/2007 09:46:26  106496
v9.01            mediasvr.exe  04/03/2007 09:51:42  9830

Workaround:
CA recommends that BrightStor ARCserve Backup users who cannot 
apply the patches at this time implement the following temporary 
workaround to mitigate the vulnerability:
1. Rename the "mediasvr.exe" file to a non-functional file name, 
   such as "mediasvr.exe.disable".
2. Restart the CA BrightStor Tape Engine service.

References (URLs may wrap):
CA SupportConnect:
http://supportconnect.ca.com/
CA SupportConnect Security Notice for this vulnerability:
BrightStor ARCserve Backup Media Server Security Notice
http://supportconnectw.ca.com/public/storage/infodocs/babmedser-secnotice.asp
Solution Document Reference APARs:
QO87569, QO87570, QO87573, QI82917, QO87575, QO87574
CA Security Advisor posting:
CA BrightStor ARCserve Backup Media Server Vulnerabilities
http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=136549
CAID: 35198, 35276
CAID Advisory links:
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35198
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35276
Reported By: ZDI
ZDI Advisory: ZDI-07-022
http://www.zerodayinitiative.com/advisories/ZDI-07-022.html
CVE References: CVE-2007-1785, CVE-2007-2139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2139
OSVDB References: OSVDB-34126, OSVDB-34127
http://osvdb.org/34126
http://osvdb.org/34127

Changelog for this advisory:
v1.0 - Initial Release

Customers who require additional information should contact CA
Technical Support at http://supportconnect.ca.com.

For technical questions or comments related to this advisory, please
send email to vuln AT ca DOT com.

If you discover a vulnerability in CA products, please report your
findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability"
form. 
URL: http://www3.ca.com/securityadvisor/vulninfo/submit.aspx


Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research

CA, 1 CA Plaza, Islandia, NY 11749
	
Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2007 CA. All rights reserved.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists