CA BrightStor ARCserve Backup RPC Interface (asdbapi.dll) Traversal Arbitrary Command Execution

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host.

Description :

This host is running BrightStor ARCServe for Windows.

The remote version of this software is affected by an arbitrary
command execution vulnerability.

By sending a specially crafted packet to the RPC server on TCP port
6504, an unauthenticated, remote attacker may be able to execute code
on the remote host with SYSTEM privileges.

See also :

http://seclists.org/bugtraq/2008/Oct/88
http://www.nessus.org/u?934ec85b
http://seclists.org/bugtraq/2008/Oct/79

Solution :

Apply the relevant update referenced in the CA security notice.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 34393 (arcserve_command_exec.nasl)

Bugtraq ID: 31684

CVE ID: CVE-2008-4397

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now