CA BrightStor ARCserve Backup RPC Interface (asdbapi.dll) Traversal Arbitrary Command Execution

critical Nessus Plugin ID 34393

Synopsis

Arbitrary code can be executed on the remote host.

Description

This host is running BrightStor ARCServe for Windows.

The remote version of this software is affected by an arbitrary command execution vulnerability.

By sending a specially crafted packet to the RPC server on TCP port 6504, an unauthenticated, remote attacker may be able to execute code on the remote host with SYSTEM privileges.

Solution

Apply the relevant update referenced in the CA security notice.

See Also

https://seclists.org/bugtraq/2008/Oct/79

https://seclists.org/bugtraq/2008/Oct/88

http://www.nessus.org/u?934ec85b

Plugin Details

Severity: Critical

ID: 34393

File Name: arcserve_command_exec.nasl

Version: 1.22

Type: remote

Agent: windows

Family: Windows

Published: 10/14/2008

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:ca:arcserve_backup

Required KB Items: Host/OS/smb

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Computer Associates ARCserve REPORTREMOTEEXECUTECML Buffer Overflow)

Reference Information

CVE: CVE-2008-4397

BID: 31684

CWE: 20, 22