Lucene search

K
zdiTenable Network SecurityZDI-07-003
HistoryJan 11, 2007 - 12:00 a.m.

CA BrightStor ARCserve Backup Message Engine Buffer Overflow Vulnerability

2007-01-1100:00:00
Tenable Network Security
www.zerodayinitiative.com
11

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.943 High

EPSS

Percentile

99.2%

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Backup. User interaction is not required to exploit this vulnerability. The specific flaws exists in the Message Engine RPC service which listens by default on TCP ports 6503 and 6504 with the following UUIDs: dc246bf0-7a7a-11ce-9f88-00805fe43838 506b1890-14c8-11d1-bbc3-00805fa6962e The service exposes buffer overflow vulnerabilities in the handlers for RPC opnums 0x2F and 0x75 that allow for arbitrary code execution when handling user-supplied data from the RPC request.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.943 High

EPSS

Percentile

99.2%