Threat Level: green Handler on Duty: Yee Ching Tok

SANS ISC: Computer Associates Arcserve Buffer Overflow Vulnerability SANS ISC InfoSec Forums

Participate: Learn more about our honeypot network

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Computer Associates Arcserve Buffer Overflow Vulnerability
Computer Associates today released an advisory and patch that deals with a remotely exploitable bug in CA BrightStor ARCserve Backup tape engine.  From TippingPoint's Zero Day Initiative site:
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Backup. User interaction is not required to exploit this vulnerability.

The specific flaw exists in the Tape Engine RPC service which listens by default on TCP port 6503 with the following UUID:


The service exposes a buffer overflow in the handler for RPC opnum 0xCF that allows for arbitrary code execution when handling user-supplied data from the RPC request.
Since the service runs on Windows as LOCAL_SYSTEM, an attacker exploiting this vuln could have complete unrestricted control over the victim.

Versions of Arcserve up to and including version 11.5 are vulnerable and admins should visit to pull down the vendor supplied fix.

Question for the community: Is anyone running Arcserve in an enterprise environment *without* running the service as LOCAL_SYSTEM?I will be teaching next: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques - SANS Network Security: Virtual Edition 2021

Adrien de Beaupre

353 Posts
ISC Handler
Jan 11th 2007

Sign Up for Free or Log In to start participating in the conversation!