-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Title: CA20090429-01: CA ARCserve Backup Apache HTTP Server Multiple Vulnerabilities CA Advisory Reference: CA20090429-01 CA Advisory Date: 2009-04-29 Reported By: Apache Software Foundation David Endler of iDefense Ulf Harnhammar for SITIC, Swedish IT Incident Centre Impact: A remote attacker can exploit a buffer overflow to gain apache privileges, or cause a denial of service. Summary: CA ARCserve Backup on Solaris, Tru64, HP-UX, and AIX contains multiple vulnerabilities in the Apache HTTP Server version as shipped with ARCserve Backup. CA has issued updates that contain version 2.0.63 of the Apache HTTP Server to address the vulnerabilities. Refer to the References section for a list of resolved issues by CVE identifier. Mitigating Factors: None Severity: CA has given these vulnerabilities a Medium risk rating. Affected Products: CA ARCserve Backup r11.5 Solaris CA ARCserve Backup r11.5 Tru64 CA ARCserve Backup r11.5 HP-UX CA ARCserve Backup r11.5 AIX Non-Affected Products: CA ARCserve Backup r11.5 Windows CA ARCserve Backup r11.5 Linux Affected Platforms: Solaris Tru64 HP-UX AIX Status and Recommendation: CA has issued the following patches to address the vulnerabilities. CA ARCserve Backup r11.5 Solaris: RO06786 CA ARCserve Backup r11.5 Tru64: RO06788 CA ARCserve Backup r11.5 HP-UX: RO06789 CA ARCserve Backup r11.5 AIX: RO06791 How to determine if you are affected: 1. From the command line, run the following to print the version of the Apache HTTP Server included with ARCserve Backup: $BAB_HOME/httpd/httpd -v Note: On HP-UX the shared library path needs to be modified prior to running the httpd command: SHLIB_PATH=$SHLIB_PATH:$BAB_HOME/httpd/lib export SHLIB_PATH 2. If the displayed version is less than 2.0.63, then the installation may be vulnerable. Workaround: As a workaround solution, disable the Apache HTTP Server with the "stopgui" command. To re-enable the server, run "startgui". Stopping the Apache HTTP Server will prevent the ARCserve user from performing GUI operations. Most of the operations provided by the GUI can be accomplished via the command line. Alternatively, restrict remote network access to reduce exposure. References (URLs may wrap): CA Support: https://support.ca.com/ CA20090429-01: Security Notice for CA ARCserve Backup Apache HTTP Server https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=2051 47 Solution Document Reference APARs: RO06786, RO06788, RO06789, RO06791 CA Security Response Blog posting: CA20090429-01: CA ARCserve Backup Apache HTTP Server Multiple Vulnerabilities http://community.ca.com/blogs/casecurityresponseblog/archive/2009/04/29. asp x Reported By: Apache Software Foundation David Endler of iDefense Ulf Harnhammar for SITIC, Swedish IT Incident Centre CVE References: CVE-2004-0747 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0747 CVE-2003-0132 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0132 OSVDB References: Pending http://osvdb.org/ Changelog for this advisory: v1.0 - Initial Release Customers who require additional information should contact CA Technical Support at https://support.ca.com. For technical questions or comments related to this advisory, please send email to vuln AT ca DOT com. If you discover a vulnerability in CA products, please report your findings to the CA Product Vulnerability Response Team. https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=1777 82 Regards, Ken Williams, Director ; 0xE2941985 CA Product Vulnerability Response Team CA, 1 CA Plaza, Islandia, NY 11749 Contact http://www.ca.com/us/contact/ Legal Notice http://www.ca.com/us/legal/ Privacy Policy http://www.ca.com/us/privacy/ Copyright (c) 2009 CA. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.10.0 (Build 500) Charset: utf-8 wj8DBQFJ+gCReSWR3+KUGYURAml1AJ9btLnecbsFT5ExensYWKeO5xJqXQCfVqve G3MQdYoTNzf/aIebT6Uw4ts= =BSya -----END PGP SIGNATURE-----