Full Disclosure mailing list archives
Re: LS-20061113 - CA BrightStor ARCserve Backup Remote Buffer Overflow Vulnerability
From: "Williams, James K" <James.Williams () ca com>
Date: Tue, 21 Nov 2006 19:13:42 -0500
-----Original Message----- From: advisories () lssec com [mailto:advisories () lssec com] Sent: Tue Nov 21 17:32:15 GMT 2006 To: Full-disclosure Subject: LS-20061113 - CA BrightStor ARCserve Backup Remote Buffer Overflow Vulnerability LS-20061113 LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup v11.5, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system. The flaw specifically exists within the Tape Engine (tapeeng.exe) due to incorrect handling of RPC requests on TCP port 6502. For technical details please visit: http://www.lssec.com/charity.html LSsecurity - LSsec.com
LSsecurity, Thanks for the report. Full-disclosure, CA is already aware of this issue, and we are currently working on a solution. If you have questions or concerns, please send email to vuln AT ca DOT com. Regards, Ken Ken Williams ; 0xE2941985 Director, CA Vulnerability Research _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- LS-20061113 - CA BrightStor ARCserve Backup Remote Buffer Overflow Vulnerability advisories (Nov 21)
- <Possible follow-ups>
- Re: LS-20061113 - CA BrightStor ARCserve Backup Remote Buffer Overflow Vulnerability Williams, James K (Nov 21)