CA BrightStor ARCserve Backup Discovery Service Overflow

High Nessus Plugin ID 23841


The remote service is affected by a buffer overflow vulnerability.


According to its version, the installation of BrightStor ARCserve Backup on the remote host allows an attacker to execute arbitrary code on the affected host with SYSTEM privileges due to a buffer overflow that can be triggered by a specially crafted packet sent to the Discovery Service.

Note that the vendor reports only Windows installs are vulnerable.


Either apply the appropriate patch as described in the vendor advisory referenced above or upgrade to BrightStor ARCserve Backup r11.5 SP2 or later.

See Also

Plugin Details

Severity: High

ID: 23841

File Name: arcserve_discovery_service_overflow.nasl

Version: $Revision: 1.13 $

Type: remote

Agent: windows

Family: Windows

Published: 2006/12/12

Modified: 2011/10/21

Dependencies: 23832, 11936

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ca:arcserve_backup

Required KB Items: ARCSERVE/Discovery/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2006/12/08

Reference Information

CVE: CVE-2006-6379

BID: 21502

OSVDB: 30775