CA BrightStor ARCserve Backup Tape Engine Multiple Remote Overflows (QO84983)

Critical Nessus Plugin ID 24013


Arbitrary code can be executed on the remote host.


This host is running BrightStor ARCServe for Windows.

The remote version of this software has multiple buffer overflow vulnerabilities in the Tape Engine MSRPC service.

An attacker, by sending a specially crafted packet, may be able to crash the affected service or execute code on the remote host.


Apply security patch QO84983.

See Also

Plugin Details

Severity: Critical

ID: 24013

File Name: arcserve_tapeengine_multiple.nasl

Version: $Revision: 1.19 $

Type: remote

Agent: windows

Family: Windows

Published: 2007/01/12

Modified: 2017/04/28

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ca:arcserve_backup

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/01/11

Vulnerability Publication Date: 2006/10/07

Exploitable With

Core Impact

Metasploit (CA BrightStor ARCserve Message Engine Buffer Overflow)

Reference Information

CVE: CVE-2006-6076, CVE-2007-0168, CVE-2007-0169

BID: 21221, 22006, 22010

OSVDB: 30637, 31318, 31327