A denial of service vulnerability has been reported within BrightStor. Although the proof-of-concept does not reach an exploitable condition, mildly altering the proof-of-concept will. The vendor has labeled the specific denial of service vulnerabilities with a medium severity. However, because of the simplicity to demonstrate an exploitable condition by altering the supplied proof of concept, eEye Research is designating these vulnerabilities as High severity.
eEye Research is currently investigating the vulnerability and searching for active exploitations and will update this ZDT entry as more information becomes available.
BrightStor ARCserve Backup r11.5
BrightStor ARCserve Backup r11.1
BrightStor ARCserve Backup r11 for Windows
BrightStor Enterprise Backup r10.5
BrightStor ARCserve Backup v9.01
CA Server Protection Suite r2
CA Business Protection Suite r2
CA Business Protection Suite for Microsoft Small Business Server Standard Edition r2
CA Business Protection Suite for Microsoft Small Business Server Premium Edition r2
NOTE: This application list is gathered from the most recent vulnerability in the same binary.
BeyondTrust Prevention and Detection:
BeyondTrust's Blink® Personal Edition protects from this vulnerability.
BeyondTrust's Blink® Professional Edition protects from this vulnerability.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
Vendor Advisory / Patch Information
Vendor-supplied mitigation strategy:
1) Rename the "mediasvr.exe" file to a non-functional file name, such as "mediasvc.exe.disable".
2) Restart the CA BrightStor Tape Engine service.
NOTE: This disables command line functionality within BrightStor.
Links:Public PoC Code Disclosure #1 (Denial of Service)
Public PoC Code Disclosure #2 (Denial of Service)
Vendor Response / Mitigation