CA BrightStor ARCserve Backup RPC Interface (asdbapi.dll) Traversal Arbitrary Command Execution

Critical Nessus Plugin ID 34393


Arbitrary code can be executed on the remote host.


This host is running BrightStor ARCServe for Windows.

The remote version of this software is affected by an arbitrary command execution vulnerability.

By sending a specially crafted packet to the RPC server on TCP port 6504, an unauthenticated, remote attacker may be able to execute code on the remote host with SYSTEM privileges.


Apply the relevant update referenced in the CA security notice.

See Also

Plugin Details

Severity: Critical

ID: 34393

File Name: arcserve_command_exec.nasl

Version: $Revision: 1.20 $

Type: remote

Agent: windows

Family: Windows

Published: 2008/10/14

Modified: 2016/11/11

Dependencies: 10785

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ca:arcserve_backup

Required KB Items: Host/OS/smb

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Exploitable With


Core Impact

Metasploit (Computer Associates ARCserve REPORTREMOTEEXECUTECML Buffer Overflow)

Reference Information

CVE: CVE-2008-4397

BID: 31684

OSVDB: 49468

CWE: 20, 22