Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14569
HistoryOct 06, 2006 - 12:00 a.m.

[Full-disclosure] TSRT-06-11: CA Multiple Product DBASVR RPC Server Multiple Buffer Overflow Vulnerabilities

2006-10-0600:00:00
vulners.com
9

TSRT-06-11: CA Multiple Product DBASVR RPC Server Multiple Buffer
Overflow Vulnerabilities
http://www.tippingpoint.com/security/advisories/TSRT-06-11.html
October 5, 2006

– CVE ID:
CVE-2006-5143

– Affected Vendor:
Computer Associates

– Affected Products:
BrightStor ARCserve Backup R11.5 Client
BrightStor ARCserve Backup R11.5 Server
BrightStor Enterprise Backup 10.5
BrightStor ARCserve Backup v9.01
CA Server Protection Suite r2
CA Business Protection Suite r2

– TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since March 27, 2006 by Digital Vaccine protection
filter ID 4268. For further product information on the TippingPoint IPS:

http://www.tippingpoint.com 

– Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Computer Associates BrightStor ARCserve
Backup, Enterprise Backup, Server Protection Suite and Business
Protection Suite. Authentication is not required to exploit this
vulnerability and both client and servers are affected.

The problem specifically exists within DBASVR.exe, the Backup Agent RPC
Server. This service exposes a number of vulnerable RPC routines through
a TCP endpoint with ID 88435ee0-861a-11ce-b86b-00001b27f656 on port
6071. The most trivial of the exposed vulnerabilities results in an
exploitable stack overflow.

The vulnerable routines include:

/* opcode: 0x01, address: 0x00401A70 */

long sub_401A70 (
[in][string] char * arg_1,
[in][string] char * arg_2, // stack overflow
[out][size_is(8192), length_is(*arg_4)] char * arg_3,
[in, out] long * arg_4
);

/* opcode: 0x02, address: 0x00401CC0*/

long sub_401CC0 (
[in][string] char * arg_1,
[in][string] char * arg_2, // stack overflow
[in][string] char * arg_3,
[out] long * arg_4
);

/* opcode: 0x18, address: 0x004041C0*/

long sub_4041C0 (
[in][string] char * arg_1,
[in][string] char * arg_2, // stack overflow
[out] long * arg_3
);

The first two vulnerable subroutines are the result of inline
strcpy()/memcpy()'s. The third vulnerable subroutine is due to an
insecure call to lstrcat().

– Vendor Response:
Computer Associates has issued an update to correct this vulnerability.
More details can be found at:

supportconnectw.ca.com/public/storage/infodocs/basbr-secnotice.asp

– Disclosure Timeline:
2006.03.27 - Digital Vaccine released to TippingPoint customers
2006.03.28 - Vulnerability reported to vendor
2006.10.05 - Coordinated public release of advisory

– Credit:
This vulnerability was discovered by Pedram Amini, TippingPoint Security
Research Team.


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Related for SECURITYVULNS:DOC:14569