Security Notice for CA ARCserve Backup caloggerd and xdr functions
1886
24 May 2019
24 May 2019
OPEN
Issued: May 19, 2008
CA's customer support is alerting customers to security risks associated with CA ARCserve Backup. Multiple vulnerabilities exist that can allow a remote attacker to cause a denial of service or execute arbitrary code. CA has issued patches to address the vulnerabilities.
The first vulnerability, CVE-2008-2241, is due to insufficient path verification by the logging service, caloggerd. An attacker can append data to arbitrary files, which can lead to system compromise.
The second vulnerability, CVE-2008-2242, is due to insufficient bounds checking by multiple xdr functions. An attacker can cause an overflow and execute arbitrary code.
Note: These issues only affect the server installation.
Risk Rating:
High
Platform:
Windows, Linux/x86/IA-64/x86_64, Tru64, HP-UX, Solaris, AIX, Linux/s390
Affected Products:
CA ARCserve Backup r11.5 (formerly BrightStor ARCserve Backup r11.5)
CA ARCserve Backup r11.1 (formerly BrightStor ARCserve Backup r11.1)
CA ARCserve Backup r11.0 (formerly BrightStor ARCserve Backup r11.0)
CA Server Protection Suite r2
CA Business Protection Suite r2
CA Business Protection Suite for Microsoft Small Business Server Standard Edition r2
CA Business Protection Suite for Microsoft Small Business Server Premium Edition r2
Non-affected Products:
CA ARCserve Backup r12
CA ARCserve Backup r11.5 SP4
How to determine if the installation is affected:
For Windows:
- Using Windows Explorer, locate the file "caloggerd.exe". By default, the file is located in the "C:Program FilesCABrightStor ARCserve Backup" directory.
- Right click on the file and select Properties.
- Select the General tab.
- If the file timestamp is earlier than indicated in the below table, the installation is vulnerable.
Product Version | File Name | Timestamp | File Size |
11.5 | caloggerd.exe | 05/18/2007 10:55:48 | 299008 bytes |
11.1 | caloggerd.exe | 05/18/2007 11:30:52 | 286720 bytes |
* For Protection Suites r2 , use the file timestamp for CA ARCserve Backup r11.5
For Linux/x86/IA-64/x86_64, Tru64, HP-UX, Solaris, Linux/s390:
Examine the file RELVERSION to determine the version. This can be done with the following command from a shell:
cat $BAB_HOME/data/RELVERSION
If the build number is below 2427, the installation is vulnerable.
Solution:
CA has issued the following patches and upgrades to address the vulnerabilities.
CA ARCserve Backup r11.5 Windows:
QO92996
CA ARCserve Backup r11.1 Windows:
QO92849
CA ARCserve Backup r11.0 Windows:
Upgrade to 11.1 and apply the latest patches.
CA Protection Suites r2:
QO92996
The issues can also be addressed by applying CA ARCserve Backup 11.5 SP4 for Windows:
QO99129
For CA ARCserve Backup r11.5 and r11.1 on *NIX platforms, upgrade to 11.5 SP3.
Note: The upgrade for 11.1 requires new license keys, which are available for free until December 31, 2008. Visit the following link for more information.
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=172649
CA ARCserve Backup r11.5 Linux/x86/IA-64/x86_64:
QO89980
CA ARCserve Backup r11.5 Tru64:
QO89985
CA ARCserve Backup r11.5 HP-UX:
QO89984
CA ARCserve Backup r11.5 Solaris:
QO89982
CA ARCserve Backup r11.5 AIX:
QO89981
CA ARCserve Backup r11.5 Linux/s390:
QO89983
CA ARCserve Backup r11.1 Linux/x86/IA-64/x86_64:
QO89980
CA ARCserve Backup r11.1 Tru64:
QO89985
CA ARCserve Backup r11.1 HP-UX:
QO89984
CA ARCserve Backup r11.1 Solaris:
QO89982
CA ARCserve Backup r11.1 AIX:
QO89981
CA ARCserve Backup r11.1 Linux/s390:
QO89983
Workaround:
None
References:
CVE-2008-2241 - caloggerd file appending
CVE-2008-2242 - xdr function buffer overflow vulnerability
Acknowledgement:
CVE-2008-2241 - An anonymous researcher working with the iDefense VCP, Damian Put working with ZDI/TippingPoint
CVE-2008-2242 - An anonymous researcher working with the iDefense VCP, Damian Put working with ZDI/TippingPoint
Change History:
Version 1.0: Initial Release
If additional information is required, please contact CA Technical Support at https://Support.ca.com.
If you discover a vulnerability in CA products, please report your findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability" form at https://www.ca.com/us/securityadvisor/vulninfo/submit.aspx.