{"vuid":"VU#979825","idnumber":"979825","name":"CA BrightStor ARCserve Backup Media Server RPC service buffer overflows","keywords":["CA","BrightStor","ARCserve","Media Server","stack-based buffer overflow","arbitrary code execution","SUN RPC service","TCP port","malformed RPC strings"],"overview":"The CA BrightStor ARCserve Backup Media Server contains multiple buffer overflows in the RPC service, which can allow a remote, unauthenticated attacker to execute arbitrary code with elevated privileges.","clean_desc":"BrightStor ARCserve Backup is a backup and data retention tool that integrates with other BrightStor Data Availability and BrightStor Storage Management solutions. The BrightStor ARCserve Media Server service, which is provided by mediasvr.exe, contains multiple buffer overflows in the handling of RPC requests. According to the CA security notice, the following products are affected\nBrightStor ARCserve Backup r11.5\nBrightStor ARCserve Backup r11.1\nBrightStor ARCserve Backup r11 for Windows\nBrightStor Enterprise Backup r10.5\nBrightStor ARCserve Backup v9.01\nCA Server Protection Suite r2\nCA Business Protection Suite r2\nCA Business Protection Suite for Microsoft Small Business Server Standard Edition r2\nCA Business Protection Suite for Microsoft Small Business Server Premium Edition r2","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with elevated privileges.","resolution":"Apply an update\nAccording to the CA security notice CA has issued the following patches to address the vulnerabilities. BrightStor ARCserve Backup r11.5 SP3 - QO87569\nBrightStor ARCserve Backup r11.5 SP2 - QO87570\nBrightStor ARCserve Backup r11.1 - QO87573\nBrightStor ARCserve Backup r11.0 - QI82917\nBrightStor Enterprise Backup r10.5 - QO87575\nBrightStor ARCserve Backup v9.01 - QO87574","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by ZDI, who in turn credit Tenable Network Security.","author":"This document was written by Will Dormann.","public":["http://supportconnectw.ca.com/public/storage/infodocs/babmedser-secnotice.asp","http://www.zerodayinitiative.com/advisories/ZDI-07-022.html","http://secunia.com/advisories/24972/"],"cveids":["CVE-2007-2139"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-04-25T11:10:32Z","publicdate":"2007-04-24T00:00:00Z","datefirstpublished":"2007-04-25T18:50:44Z","dateupdated":"2007-04-25T20:05:20Z","revision":7,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"9","cam_population":"12","cam_impact":"20","cam_easeofexploitation":"6","cam_attackeraccessrequired":"15","cam_scorecurrent":"9.72","cam_scorecurrentwidelyknown":"11.745","cam_scorecurrentwidelyknownexploited":"19.845","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.72,"vulnote":null}