Vulnerabilities > CVE-2007-1785
Attack vector
NETWORK Attack complexity
HIGH Privileges required
SINGLE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
The RPC service in mediasvr.exe in CA BrightStor ARCserve Backup 11.5 SP2 build 4237 allows remote attackers to execute arbitrary code via crafted xdr_handle_t data in RPC packets, which is used in calculating an address for a function call, as demonstrated using the 191 (0xbf) RPC request.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 | |
Application | 1 |
Exploit-Db
description | CA BrightStor Backup 11.5.2.0 (Mediasvr.exe) Remote Code Exploit. CVE-2007-1785. Remote exploit for windows platform |
id | EDB-ID:3604 |
last seen | 2016-01-31 |
modified | 2007-03-29 |
published | 2007-03-29 |
reporter | Shirkdog |
source | https://www.exploit-db.com/download/3604/ |
title | CA BrightStor Backup 11.5.2.0 Mediasvr.exe Remote Code Exploit |
Nessus
NASL family | Windows |
NASL id | ARCSERVE_QO87569.NASL |
description | According to its version, the installation of BrightStor ARCserve Backup on the remote host is affected by multiple vulnerabilities in the Mediasrv RPC service. First, the service does not properly sanitize a string given as an argument to different RPC functions prior to calling the function strncpy. By sending a specially crafted packet it is possible to overflow a stack buffer. The second vulnerability involves the handler given as an argument for most RPC functions. The service does the check that the handler is valid. By sending a specially crafted handler to those functions, it is possible to redirect the execution flow. An unauthenticated, remote attacker may be able to leverage these issues to crash or disable the service or to execute arbitrary code on the affected host with SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25086 |
published | 2007-04-25 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25086 |
title | CA BrightStor ARCserve Backup Multiple Vulnerabilities (QO87569) |
code |
|
References
- http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0467.html
- http://secunia.com/advisories/24682
- http://securityreason.com/securityalert/2509
- http://supportconnectw.ca.com/public/storage/infodocs/babmedser-secnotice.asp
- http://www.kb.cert.org/vuls/id/151305
- http://www.securityfocus.com/archive/1/464270/100/0/threaded
- http://www.securityfocus.com/archive/1/464343/100/0/threaded
- http://www.securityfocus.com/bid/23209
- http://www.securitytracker.com/id?1017830
- http://www.shirkdog.us/camediasvrremote.py
- http://www.shirkdog.us/shk-004.html
- http://www.vupen.com/english/advisories/2007/1161
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33316