CA ARCserve Backup Remote Code Execution (CA20121018) (uncredentialed check)

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote host has a backup application that is affected by a remote
code execution vulnerability.

Description :

The version of CA ARCserve Backup running on the remote Windows host is
potentially affected by a remote code execution vulnerability. A flaw
exists with how RPC requests are processed that could lead to code
execution on server installations.

In addition, a denial of service vulnerability (CVE-2012-2972) was
reported for this version of CA ARCserve Backup, but Nessus has not
checked for it.

See also :

http://www.nessus.org/u?5ad7ac22
http://www.nessus.org/u?e9b95a6d

Solution :

Apply the patch referenced in the advisory.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Gain a shell remotely

Nessus Plugin ID: 63146 ()

Bugtraq ID: 56116

CVE ID: CVE-2012-2971