Top-Themen

AppleEntwicklungHardwareInternetLinuxMicrosoftMultimediaNetzwerkeOff TopicSicherheitSonstige SystemeVirtualisierungWeiterbildungZusammenarbeit

Aktuelle Themen

Administrator.de FeedbackApache ServerAppleAssemblerAudioAusbildungAuslandBackupBasicBatch & ShellBenchmarksBibliotheken & ToolkitsBlogsCloud-DiensteClusterCMSCPU, RAM, MainboardsCSSC und C++DatenbankenDatenschutzDebianDigitiales FernsehenDNSDrucker und ScannerDSL, VDSLE-BooksE-BusinessE-MailEntwicklungErkennung und -AbwehrExchange ServerFestplatten, SSD, RaidFirewallFlatratesGoogle AndroidGrafikGrafikkarten & MonitoreGroupwareHardwareHosting & HousingHTMLHumor (lol)Hyper-VIconsIDE & EditorenInformationsdiensteInstallationInstant MessagingInternetInternet DomäneniOSISDN & AnaloganschlüsseiTunesJavaJavaScriptKiXtartKVMLAN, WAN, WirelessLinuxLinux DesktopLinux NetzwerkLinux ToolsLinux UserverwaltungLizenzierungMac OS XMicrosoftMicrosoft OfficeMikroTik RouterOSMonitoringMultimediaMultimedia & ZubehörNetzwerkeNetzwerkgrundlagenNetzwerkmanagementNetzwerkprotokolleNotebook & ZubehörNovell NetwareOff TopicOpenOffice, LibreOfficeOutlook & MailPapierkorbPascal und DelphiPeripheriegerätePerlPHPPythonRechtliche FragenRedHat, CentOS, FedoraRouter & RoutingSambaSAN, NAS, DASSchriftartenSchulung & TrainingSEOServerServer-HardwareSicherheitSicherheits-ToolsSicherheitsgrundlagenSolarisSonstige SystemeSoziale NetzwerkeSpeicherkartenStudentenjobs & PraktikumSuche ProjektpartnerSuseSwitche und HubsTipps & TricksTK-Netze & GeräteUbuntuUMTS, EDGE & GPRSUtilitiesVB for ApplicationsVerschlüsselung & ZertifikateVideo & StreamingViren und TrojanerVirtualisierungVisual StudioVmwareVoice over IPWebbrowserWebentwicklungWeiterbildungWindows 7Windows 8Windows 10Windows InstallationWindows MobileWindows NetzwerkWindows ServerWindows SystemdateienWindows ToolsWindows UpdateWindows UserverwaltungWindows VistaWindows XPXenserverXMLZusammenarbeit
GELÖST

Hochkritisch! CA BrightStor ARCserve Backup Discovery Service Buffer Overflow Vulnerability

Frage Sicherheit

Mitglied: gnarff

gnarff (Level 2) - Jetzt verbinden

09.12.2006, aktualisiert 07.01.2009, 9242 Aufrufe

CA BrightStor ARCserve Backup contains a buffer overflow
that allows remote attackers to execute arbitrary code with local
SYSTEM privileges on Windows. This issue affects the BrightStor
Backup Discovery Service in multiple BrightStor ARCserve Backup
application agents and the Base product.

CA Vulnerability ID (CAID): 34846

CA Advisory Date: 2006-12-07

Discovered By: Assurent Secure Technologies (assurent.com)

Impact: Remote attacker can execute arbitrary code.

Mitigating Factors: None.

Severity: CA has given this vulnerability a High risk rating.

Affected Products:
BrightStor Products:
- BrightStor ARCserve Backup r11.5 SP1 and below (SP2 does not
have this vulnerability ; please apply r11.5 SP2)
- BrightStor ARCserve Backup r11.1
- BrightStor ARCserve Backup for Windows r11
- BrightStor Enterprise Backup 10.5
- BrightStor ARCserve Backup v9.01
CA Protection Suites r2:
- CA Server Protection Suite r2
- CA Business Protection Suite r2
- CA Business Protection Suite for Microsoft Small Business Server
Standard Edition r2
- CA Business Protection Suite for Microsoft Small Business Server
Premium Edition r2

Affected platforms:
Microsoft Windows

Status and Recommendation:
Customers with vulnerable versions of BrightStor ARCserve Backup
products should upgrade to the latest versions which are available
for download from http://supportconnect.ca.com.
Solution Document Reference APARs:
QO84609, QI82917, QO84611, QO84610

Determining if you are affected:
For a list of updated files, and instructions on how to verify
that the security update was fully applied, please review the
Informational Solution referenced in the appropriate Solution
Document.

References (URLs may wrap):
CA SupportConnect:
http://supportconnect.ca.com/
CA SupportConnect Security Notice for this vulnerability:
Important Security Notice for BrightStor ARCserve Backup
http://supportconnectw.ca.com/public/storage/infodocs/babsecurity-notic ...
Solution Document Reference APARs:
QO84609, QI82917, QO84611, QO84610
CA Security Advisor Research Blog postings:
http://www3.ca.com/blogs/posting.aspx?id=90744&pid=96149&date=2 ...
CAID: 34846
CAID Advisory links:
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34846
Discoverer: Assurent Secure Technologies
http://www.assurent.com/
CVE Reference: CVE-2006-6379
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6379
OSVDB Reference: OSVDB IDs: 30775
http://osvdb.org/30775

Changelog for this advisory:
v1.0 - Initial Release

saludos
gnarff
Ähnliche Inhalte
Backup
XEN Server Backup (8)

Frage von certifiedit.net zum Thema Backup ...

Windows Server
Xendesktop - Machine Cration Service Event 2006

Frage von rainergugus zum Thema Windows Server ...

Windows Server
SCCMCB - delete inactive client discovery data

Frage von Hoerti zum Thema Windows Server ...

Neue Wissensbeiträge
Heiß diskutierte Inhalte
Firewall
Welche Firewall ? (18)

Frage von Cyberurmel zum Thema Firewall ...

Windows Server
gelöst Einzelnes Windows Update über GPO deinstallieren (16)

Frage von lordofremixes zum Thema Windows Server ...

Windows Server
GPO zum Deinstallieren von Office Update wird nicht ausgeführt (15)

Frage von lordofremixes zum Thema Windows Server ...