Lucene search

K
saintSAINT CorporationSAINT:F5D43C455C2DCCD9149E0175C2E13F89
HistoryJan 19, 2007 - 12:00 a.m.

BrightStor ARCserve Message Engine opnum 0x2f buffer overflow

2007-01-1900:00:00
SAINT Corporation
my.saintcorporation.com
13

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.937 High

EPSS

Percentile

99.1%

Added: 01/19/2007
CVE: CVE-2007-0169
BID: 22005
OSVDB: 31318

Background

The BrightStor ARCserve Backup server runs the Message Engine RPC service on ports 6503/TCP and 6504/TCP by default.

Problem

A buffer overflow in BrightStor ARCserve Backup allows remote attackers to execute arbitrary commands by sending a specially crafted request with opnum 0x2f to the Message Engine RPC service.

Resolution

Apply the patch referenced in the Security Notice.

References

<http://www.zerodayinitiative.com/advisories/ZDI-07-003.html&gt;
<http://www.kb.cert.org/vuls/id/180336&gt;

Limitations

Exploit works on BrightStor ARCserve Backup r11.5 SP2.

Platforms

Windows

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.937 High

EPSS

Percentile

99.1%