CA ARCserve Backup Remote Code Execution (CA20121018) (uncredentialed check)

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

The remote host has a backup application that is affected by a remote
code execution vulnerability.

Description :

The version of CA ARCserve Backup running on the remote Windows host is
potentially affected by a remote code execution vulnerability. A flaw
exists with how RPC requests are processed that could lead to code
execution on server installations.

In addition, a denial of service vulnerability (CVE-2012-2972) was
reported for this version of CA ARCserve Backup, but Nessus has not
checked for it.

See also :

Solution :

Apply the patch referenced in the advisory.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false

Family: Gain a shell remotely

Nessus Plugin ID: 63146 ()

Bugtraq ID: 56116

CVE ID: CVE-2012-2971

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now