BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Multiple BrightStor Backup RPC Vulnerabilities

Disclosed May 16, 2007    Partially Patched

Vulnerability Description:

A denial of service vulnerability has been reported within BrightStor. Although the proof-of-concept does not reach an exploitable condition, mildly altering the proof-of-concept will. The vendor has labeled the specific denial of service vulnerabilities with a medium severity. However, because of the simplicity to demonstrate an exploitable condition by altering the supplied proof of concept, eEye Research is designating these vulnerabilities as High severity.

eEye Research is currently investigating the vulnerability and searching for active exploitations and will update this ZDT entry as more information becomes available.

Vendors:

Computer Associates

Vulnerable Software/Devices:

BrightStor ARCserve Backup r11.5
BrightStor ARCserve Backup r11.1
BrightStor ARCserve Backup r11 for Windows
BrightStor Enterprise Backup r10.5
BrightStor ARCserve Backup v9.01
CA Server Protection Suite r2
CA Business Protection Suite r2
CA Business Protection Suite for Microsoft Small Business Server Standard Edition r2
CA Business Protection Suite for Microsoft Small Business Server Premium Edition r2
NOTE: This application list is gathered from the most recent vulnerability in the same binary.

Vulnerability Severity:

High

Exploit Availability:

N/A

BeyondTrust Prevention and Detection:

BeyondTrust's Blink® Personal Edition protects from this vulnerability.
BeyondTrust's Blink® Professional Edition protects from this vulnerability.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

Patch:
Vendor Advisory / Patch Information

Mitigation:

Vendor-supplied mitigation strategy:
1) Rename the "mediasvr.exe" file to a non-functional file name, such as "mediasvc.exe.disable".
2) Restart the CA BrightStor Tape Engine service.
NOTE: This disables command line functionality within BrightStor.

Links:

Public PoC Code Disclosure #1 (Denial of Service)
Public PoC Code Disclosure #2 (Denial of Service)
Vendor Response / Mitigation

CVE(s):

None

Leave a Reply