Important Security Notice for CA ARCserve Backup
1871
24 May 2019
24 May 2019
OPEN
Last Updated: January 11, 2007
CA's Technical Support is alerting customers to a security risk associated with CA ARCserve Backup. Researchers at TippingPoint (www.tippingpoint.com), IBM ISS (www.iss.net) and iDefense (labs.idefense.com) have detected exploitable problems and reported the vulnerabilities to CA. We have been working with them to understand the nature of the problems and to make certain that the provided fixes address the vulnerabilities.
CA has confirmed the presence of these vulnerabilities and has completed development of the fixes that provide protection against them. The updates are being released and made available to CA customers on January 11, 2007.
These vulnerabilities involve multiple overflow conditions that can allow arbitrary code to be executed remotely with local SYSTEM privileges on Windows. BrightStor ARCserve Backup Tape Engine service, Mediasvr service, and ASCORE.dll file are affected.
Customers with vulnerable versions of the CA ARCserve Backup products should upgrade to the latest versions which will be available for download from https://Support.ca.com on or before January 11, 2007.
Affected products:
BrightStor Products | |
CA ARCserve Backup r11.5 CA ARCserve Backup r11.1 CA ARCserve Backup for Windows r11 BrightStor Enterprise Backup r10.5 CA ARCserve Backup v9.01 | |
CA Protection Suites r2 | |
CA Server Protection Suite r2 CA Business Protection Suite r2 CA Business Protection Suite for Microsoft Small Business Server Standard Edition r2 CA Business Protection Suite for Microsoft Small Business Server Premium Edition r2 |
Affected platforms:
Windows
Prerequisite conditions for the vulnerability to be exploitable
None
Fixes to apply:
BAB r11.5 - QO84983
BAB r11.1 - QO84984
BAB r11.0 - QI82917
BEB r10.5 - QO84986
BAB v9.01 - QO84985
Should you require additional information, please contact CA Technical Support at https://Support.ca.com.