Short Name |
APP:CA:ARCSRV:LGSERVER-AUTH-USR |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
CA BrightStor ARCServe Backup LGServer Authentication Username Overflow |
Release Date |
2010/10/15 |
Update Number |
1794 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
A stack-based buffer overflow vulnerability exists in CA BrightStor ARCServe Backup for Laptops and Desktops. The vulnerability is due to insufficient bounds checking in the LGServer process while performing authentication of users. A remote unauthenticated attacker could exploit this vulnerability by sending an overly large user name to the vulnerable service, and could inject and execute arbitrary code with System privileges. In an attack case where code injection is not successful, the affected service will terminate unexpectedly. This will create a denial of service condition of the affected service only. In a more sophisticated attack where code injection results in successful process flow diverting, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the running process, normally System.
Computer Associates ARCserve Backup for Laptops & Desktops is prone to multiple remote buffer-overflow vulnerabilities because the application fails to bounds-check user-supplied input before copying it into an insufficiently sized memory buffer. Successfully exploiting these issues allows remote attackers to execute arbitrary machine code with SYSTEM-Level privileges. This will result in a complete compromise of affected computers. ARCserve Backup for Laptops & Desktops r11.1 is reported vulnerable.