Security Notice for CA ARCserve Backup caloggerd and xdr functions

1886

24 May 2019

24 May 2019

OPEN

Issued: May 19, 2008

CA's customer support is alerting customers to security risks associated with CA ARCserve Backup. Multiple vulnerabilities exist that can allow a remote attacker to cause a denial of service or execute arbitrary code. CA has issued patches to address the vulnerabilities.

The first vulnerability, CVE-2008-2241, is due to insufficient path verification by the logging service, caloggerd. An attacker can append data to arbitrary files, which can lead to system compromise.

The second vulnerability, CVE-2008-2242, is due to insufficient bounds checking by multiple xdr functions. An attacker can cause an overflow and execute arbitrary code.

Note: These issues only affect the server installation.

Risk Rating:

High

Platform:

Windows, Linux/x86/IA-64/x86_64, Tru64, HP-UX, Solaris, AIX, Linux/s390

Affected Products:

CA ARCserve Backup r11.5 (formerly BrightStor ARCserve Backup r11.5)
CA ARCserve Backup r11.1 (formerly BrightStor ARCserve Backup r11.1)
CA ARCserve Backup r11.0 (formerly BrightStor ARCserve Backup r11.0)
CA Server Protection Suite r2
CA Business Protection Suite r2
CA Business Protection Suite for Microsoft Small Business Server Standard Edition r2
CA Business Protection Suite for Microsoft Small Business Server Premium Edition r2

Non-affected Products:

CA ARCserve Backup r12
CA ARCserve Backup r11.5 SP4

How to determine if the installation is affected:

For Windows:

  1. Using Windows Explorer, locate the file "caloggerd.exe". By default, the file is located in the "C:Program FilesCABrightStor ARCserve Backup" directory.

  2. Right click on the file and select Properties.

  3. Select the General tab.

  4. If the file timestamp is earlier than indicated in the below table, the installation is vulnerable.
Product Version File Name Timestamp File Size
11.5 caloggerd.exe 05/18/2007 10:55:48 299008 bytes
11.1 caloggerd.exe 05/18/2007 11:30:52 286720 bytes

* For Protection Suites r2 , use the file timestamp for CA ARCserve Backup r11.5

For Linux/x86/IA-64/x86_64, Tru64, HP-UX, Solaris, Linux/s390:

Examine the file RELVERSION to determine the version. This can be done with the following command from a shell:

cat $BAB_HOME/data/RELVERSION

If the build number is below 2427, the installation is vulnerable.

Solution:

CA has issued the following patches and upgrades to address the vulnerabilities.

CA ARCserve Backup r11.5 Windows:
QO92996

CA ARCserve Backup r11.1 Windows:
QO92849

CA ARCserve Backup r11.0 Windows:
Upgrade to 11.1 and apply the latest patches.

CA Protection Suites r2:
QO92996

The issues can also be addressed by applying CA ARCserve Backup 11.5 SP4 for Windows:
QO99129

For CA ARCserve Backup r11.5 and r11.1 on *NIX platforms, upgrade to 11.5 SP3.

Note: The upgrade for 11.1 requires new license keys, which are available for free until December 31, 2008. Visit the following link for more information.
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=172649

CA ARCserve Backup r11.5 Linux/x86/IA-64/x86_64:
QO89980

CA ARCserve Backup r11.5 Tru64:
QO89985

CA ARCserve Backup r11.5 HP-UX:
QO89984

CA ARCserve Backup r11.5 Solaris:
QO89982

CA ARCserve Backup r11.5 AIX:
QO89981

CA ARCserve Backup r11.5 Linux/s390:
QO89983

CA ARCserve Backup r11.1 Linux/x86/IA-64/x86_64:
QO89980

CA ARCserve Backup r11.1 Tru64:
QO89985

CA ARCserve Backup r11.1 HP-UX:
QO89984

CA ARCserve Backup r11.1 Solaris:
QO89982

CA ARCserve Backup r11.1 AIX:
QO89981

CA ARCserve Backup r11.1 Linux/s390:
QO89983

Workaround:

None

References:

CVE-2008-2241 - caloggerd file appending
CVE-2008-2242 - xdr function buffer overflow vulnerability

Acknowledgement:

CVE-2008-2241 - An anonymous researcher working with the iDefense VCP, Damian Put working with ZDI/TippingPoint
CVE-2008-2242 - An anonymous researcher working with the iDefense VCP, Damian Put working with ZDI/TippingPoint

Change History:

Version 1.0: Initial Release

If additional information is required, please contact CA Technical Support at https://Support.ca.com.

If you discover a vulnerability in CA products, please report your findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability" form at https://www.ca.com/us/securityadvisor/vulninfo/submit.aspx.