Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:CA:ARCSRV:D2D-AXIS2-RCE

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

CA ARCserve D2D Axis2 Default Credentials Remote Code Execution

Release Date

2013/05/29

Update Number

2268

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: CA ARCserve D2D Axis2 Default Credentials Remote Code Execution


This signature detects attempts to exploit a known vulnerability in CA ARCserve D2D Axis2. A successful attack can leverage this vulnerability to upload a malicious web service to a target system, enabling arbitrary code execution within the security context of the server.

Extended Description

The 'Axis2' component of Computer Associates ARCserve D2D is prone to a vulnerability that allows attackers to bypass certain security restrictions. An attacker can exploit this issue to bypass certain security restrictions and gain access to the application. Successfully exploiting this issue will allow attackers to execute arbitrary code with SYSTEM-level privileges, completely compromising the computer. Computer Associates ARCserve D2D r15 is vulnerable. Other products from multiple vendors that embed the 'Axis2' component may also be affected.

Affected Products

  • Computer Associates ARCServe D2D r15

References

  • BugTraq: 45625
  • CVE: CVE-2010-0219

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out