---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: CA ARCserve Backup Multiple Vulnerabilities SECUNIA ADVISORY ID: SA30300 VERIFY ADVISORY: http://secunia.com/advisories/30300/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From local network SOFTWARE: CA Server Protection Suite r2 http://secunia.com/product/6873/ BrightStor ARCserve Backup 11.x (for Windows) http://secunia.com/product/3099/ BrightStor ARCserve Backup 11.x http://secunia.com/product/312/ DESCRIPTION: Some vulnerabilities have been reported in CA ARCserve Backup, which can be exploited by malicious people to compromise a vulnerable system. 1) An input validation error within the logging service (caloggerd) can be exploited to append arbitrary data to arbitrary files via directory traversal attacks. 2) Boundary errors in certain xdr functions (e.g. "xdr_rwsstring()") can be exploited to cause stack-based buffer overflows. Successful exploitation of the vulnerabilities allows execution of arbitrary code. The vulnerabilities affect the following products: * CA ARCserve Backup r11.5 (formerly BrightStor ARCserve Backup r11.5) * CA ARCserve Backup r11.1 (formerly BrightStor ARCserve Backup r11.1) * CA ARCserve Backup r11.0 (formerly BrightStor ARCserve Backup r11.0) * CA Server Protection Suite r2 * CA Business Protection Suite r2 * CA Business Protection Suite for Microsoft Small Business Server Standard Edition r2 * CA Business Protection Suite for Microsoft Small Business Server Premium Edition r2 SOLUTION: Apply patches. Please see the vendor's advisory for more information. PROVIDED AND/OR DISCOVERED BY: Independently discovered by: * Damian Put, reported via ZDI * An anonymous researcher, reported via iDefense Labs ORIGINAL ADVISORY: CA: https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798 ZDI: http://www.zerodayinitiative.com/advisories/ZDI-08-027/ http://www.zerodayinitiative.com/advisories/ZDI-08-026/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------