Computer Associates today released an advisory and patch that deals with a remotely exploitable bug in CA BrightStor ARCserve Backup tape engine. From TippingPoint's Zero Day Initiative site:
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Backup. User interaction is not required to exploit this vulnerability.Since the service runs on Windows as LOCAL_SYSTEM, an attacker exploiting this vuln could have complete unrestricted control over the victim. Versions of Arcserve up to and including version 11.5 are vulnerable and admins should visit http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp to pull down the vendor supplied fix. Question for the community: Is anyone running Arcserve in an enterprise environment *without* running the service as LOCAL_SYSTEM?I will be teaching next: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques - SANS Pen Test & Offensive Training 2021 |
Adrien de Beaupre 353 Posts ISC Handler Jan 11th 2007 |
Thread locked Subscribe |
Jan 11th 2007 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!