CA BrightStor ARCserve Backup for Windows Multiple Remote Buffer Overflows (QO81201)

High Nessus Plugin ID 22510


Arbitrary code can be executed on the remote host.


This host is running BrightStor ARCServe for Windows.

The remote version of this software has multiple buffer overflow vulnerabilities.

An attacker, by sending a specially crafted packet, may be able to execute code on the remote host.


Apply service pack 2 for Arcserve 11.5 or install the security patch.

See Also

Plugin Details

Severity: High

ID: 22510

File Name: arcserve_windows_multiple.nasl

Version: $Revision: 1.17 $

Type: remote

Agent: windows

Family: Windows

Published: 2006/10/06

Modified: 2017/04/28

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ca:arcserve_backup

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/10/05

Vulnerability Publication Date: 2006/10/05

Exploitable With


Core Impact

Metasploit (CA BrightStor ARCserve Message Engine Heap Overflow)

Reference Information

CVE: CVE-2006-5142, CVE-2006-5143

BID: 20364, 20365

OSVDB: 29533, 29534, 29535, 29580, 31318