CA BrightStor ARCserve Backup for Windows Multiple Remote Buffer Overflows (QO81201)

high Nessus Plugin ID 22510

Synopsis

Arbitrary code can be executed on the remote host.

Description

This host is running BrightStor ARCServe for Windows.

The remote version of this software has multiple buffer overflow vulnerabilities.

An attacker, by sending a specially crafted packet, may be able to execute code on the remote host.

Solution

Apply service pack 2 for Arcserve 11.5 or install the security patch.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-06-031/

http://www.nessus.org/u?eed70140

Plugin Details

Severity: High

ID: 22510

File Name: arcserve_windows_multiple.nasl

Version: 1.19

Type: remote

Agent: windows

Family: Windows

Published: 10/6/2006

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:ca:arcserve_backup

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/5/2006

Vulnerability Publication Date: 10/5/2006

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (CA BrightStor ARCserve Message Engine Heap Overflow)

Reference Information

CVE: CVE-2006-5142, CVE-2006-5143

BID: 20364, 20365