Short Name |
APP:CA:ARCSRV:LGSERVER-AUTH |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
CA BrightStor ARCServe Backup LGServer Authentication Password Buffer Overflow |
Release Date |
2010/10/15 |
Update Number |
1794 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
There exist two buffer overflow vulnerabilities in the way CA BrightStor ARCServe Backup for Laptops and Desktops service handles incoming messages. Specifically the vulnerabilities are due to lack of boundary check when processing user authentication requests. By sending specially crafted authentication request, an unauthenticated remote attacker can leverage these flaws to execute arbitrary code on the target host with System privileges. In an attack case where code injection is not successful, the affected service will terminate unexpectedly. This will create a denial of service condition of the affected service. In a more sophisticated attack where code injection results in successful process flow diverting, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the running process, normally System.
Computer Associates ARCserve Backup for Laptops & Desktops is prone to multiple remote buffer-overflow vulnerabilities because the application fails to bounds-check user-supplied input before copying it into an insufficiently sized memory buffer. Successfully exploiting these issues allows remote attackers to execute arbitrary machine code with SYSTEM-Level privileges. This will result in a complete compromise of affected computers. ARCserve Backup for Laptops & Desktops r11.1 is reported vulnerable.