The CA ARCserve Backup authentication service,
caauthd.exe, is susceptible to a denial-of-service vulnerability. CA ARCserve Backup r16 SP1 was reported to be vulnerable.
The Offensive Security advisory states:
By specifying an invalid field size for the encrypted username or password in a crafted RPC packet, the authentication service performs an invalid pointer dereference while trying to decrypt the character string. Authentication is not required to trigger the vulnerability and successful exploitation of this vulnerability for the caauthd.exe process will lead to a denial of service.
Additional details may be found in CA20121018-01: Security Notice for CA ARCserve Backup.
An unauthenticated remote attacker may be able to trigger a denial-of-service condition.
Apply a Patch
* CA ARCserve Backup for Windows r12.5 apply patch RO49917 * CA ARCserve Backup for Windows r15 apply patch RO49916 * CA ARCserve Backup for Windows r16 apply patch RO49750
As a general good security practice, only allow connections from trusted hosts and networks.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Notified: July 11, 2012 Updated: August 31, 2012
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector
Base | 7.8 | AV:N/AC:L/Au:N/C:N/I:N/A:C
Temporal | 6.1 | E:POC/RL:OF/RC:C
Environmental | 6.1 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND
Thanks to Matteo Memelli of Offensive Security for reporting this vulnerability.
This document was written by Jared Allar.
CVE IDs: | CVE-2012-2972
Date Public: | 2012-08-31
Date First Published: | 2012-10-30
Date Last Updated: | 2012-10-30 20:05 UTC
Document Revision: | 23