SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   CA ARCserve Backup Vendors:   CA
CA BrightStor ARCserve 'Mediasvr.exe' and 'caloggerd.exe' Can Be Crashed By Remote Users
SecurityTracker Alert ID:  1018076
SecurityTracker URL:  http://securitytracker.com/id/1018076
CVE Reference:   CVE-2007-2772   (Links to External Site)
Updated:  May 12 2008
Original Entry Date:  May 17 2007
Impact:   Denial of service via network
Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   Two vulnerabilities were reported in BrightStor ARCserve. A remote user can cause denial of service conditions.

A remote user can send specially crafted data to cause 'Mediasvr.exe' and 'caloggerd.exe' to crash.

Shirkdog Security reported these vulnerabilities.

A demonstration exploit is available at:

http://www.milw0rm.com/exploits/3939
http://www.milw0rm.com/exploits/3940

Impact:   A remote user can cause the target service to crash.
Solution:   No solution was available at the time of this entry.

The vendor is working on a fix.

The vendor has provided the following workaround instructions [quoted]:

To mitigate the Mediasvr.exe vulnerability, CA recommends that
BrightStor ARCserve Backup users implement the following temporary
workaround:

1. Rename the "mediasvr.exe" file to a non-functional file
name, such as "mediasvc.exe.disable".

2. Then restart the CA BrightStor Tape Engine service.

This will disable the command line functionality in the product
(i.e. command line utilities such as ca_backup, ca_restore,
ca_merge, ca_qmgr, ca_scan, etc will not work).

Vendor URL:  www.ca.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:   Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Wed, 16 May 2007 17:55:40 -0400
Subject:  CA BrightStor ARCserve Backup Mediasvr.exe and caloggerd.exe Vulnerabilities

Title: CA BrightStor ARCserve Backup Mediasvr.exe and 
caloggerd.exe Vulnerabilities

Notice Date: 2007-05-16

CA is aware that two functional exploit code samples were 
publicized on May 16, 2007. These two denial of service exploits 
are associated with vulnerabilities in CA BrightStor ARCserve 
Backup Mediasvr.exe and caloggerd.exe.

We have verified that vulnerabilities do exist, and we are now 
working on a patch to address the issues. We have given these 
vulnerabilities a Medium risk rating.

To mitigate the Mediasvr.exe vulnerability, CA recommends that 
BrightStor ARCserve Backup users implement the following temporary 
workaround:

   1. Rename the "mediasvr.exe" file to a non-functional file 
      name, such as "mediasvc.exe.disable".

   2. Then restart the CA BrightStor Tape Engine service.

This will disable the command line functionality in the product 
(i.e. command line utilities such as ca_backup, ca_restore, 
ca_merge, ca_qmgr, ca_scan, etc will not work).

After we have completed our analysis of these issues, we will post 
an update and patches on the CA SupportConnect website. If 
additional information is required, please contact CA Technical 
Support at http://supportconnect.ca.com.

If you discover a vulnerability in CA products, please report your 
findings to vuln AT ca DOT com, or utilize our "Submit a 
Vulnerability" form at 
http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx


Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research

CA, 1 CA Plaza, Islandia, NY 11749
	
Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2007 CA. All rights reserved.


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC