Vulnerabilities > CVE-2007-3216 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Broadcom Brightstor Arcserve Backup Laptops Desktops 11.1
Summary
Multiple buffer overflows in the LGServer component of CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.1 allow remote attackers to execute arbitrary code via crafted arguments to the (1) rxsAddNewUser, (2) rxsSetUserInfo, (3) rxsRenameUser, (4) rxsSetMessageLogSettings, (5) rxsExportData, (6) rxsSetServerOptions, (7) rxsRenameFile, (8) rxsACIManageSend, (9) rxsExportUser, (10) rxsImportUser, (11) rxsMoveUserData, (12) rxsUseLicenseIni, (13) rxsLicGetSiteId, (14) rxsGetLogFileNames, (15) rxsGetBackupLog, (16) rxsBackupComplete, (17) rxsSetDataProtectionSecurityData, (18) rxsSetDefaultConfigName, (19) rxsGetMessageLogSettings, (20) rxsHWDiskGetTotal, (21) rxsHWDiskGetFree, (22) rxsGetSubDirs, (23) rxsGetServerDBPathName, (24) rxsSetServerOptions, (25) rxsDeleteFile, (26) rxsACIManageSend, (27) rxcReadBackupSetList, (28) rxcWriteConfigInfo, (29) rxcSetAssetManagement, (30) rxcWriteFileListForRestore, (31) rxcReadSaveSetProfile, (32) rxcInitSaveSetProfile, (33) rxcAddSaveSetNextAppList, (34) rxcAddSaveSetNextFilesPathList, (35) rxcAddNextBackupSetIncWildCard, (36) rxcGetRevisions, (37) rxrAddMovedUser, (38) rxrSetClientVersion, or (39) rxsSetDataGrowthScheduleAndFilter commands.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Buffer Overflow via Environment Variables This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
- Overflow Buffers Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
- Client-side Injection-induced Buffer Overflow This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
- Filter Failure through Buffer Overflow In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
- MIME Conversion An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
Exploit-Db
description CA BrightStor ARCserve for Laptops & Desktops LGServer (rxsSetDataGrowthScheduleAndFilter) Buffer Overflow. CVE-2007-3216. Remote exploit for windows pla... id EDB-ID:16415 last seen 2016-02-01 modified 2011-03-10 published 2011-03-10 reporter metasploit source https://www.exploit-db.com/download/16415/ title CA BrightStor ARCserve for Laptops & Desktops LGServer rxsSetDataGrowthScheduleAndFilter Buffer Overflow description CA BrightStor ARCserve for Laptops & Desktops LGServer Multiple Commands Buffer Overflow. CVE-2007-3216. Remote exploit for windows platform id EDB-ID:16416 last seen 2016-02-01 modified 2010-11-04 published 2010-11-04 reporter metasploit source https://www.exploit-db.com/download/16416/ title CA BrightStor ARCserve for Laptops & Desktops LGServer Multiple Commands Buffer Overflow description CA BrightStor ARCserve for Laptops & Desktops LGServer Buffer Overflow. CVE-2007-3216. Remote exploit for windows platform id EDB-ID:16409 last seen 2016-02-01 modified 2010-11-03 published 2010-11-03 reporter metasploit source https://www.exploit-db.com/download/16409/ title CA BrightStor ARCserve for Laptops & Desktops LGServer Buffer Overflow
Metasploit
description This module exploits a stack buffer overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request to multiple commands, an attacker could overflow the buffer and execute arbitrary code. id MSF:EXPLOIT/WINDOWS/BRIGHTSTOR/LGSERVER_MULTI last seen 2020-03-10 modified 2017-07-24 published 2010-11-04 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3216 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/brightstor/lgserver_multi.rb title CA BrightStor ARCserve for Laptops and Desktops LGServer Multiple Commands Buffer Overflow description This module exploits a stack buffer overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request (rxsSetDataGrowthScheduleAndFilter), an attacker could overflow the buffer and execute arbitrary code. id MSF:EXPLOIT/WINDOWS/BRIGHTSTOR/LGSERVER_RXSSETDATAGROWTHSCHEDULEANDFILTER last seen 2020-06-13 modified 2017-07-24 published 2010-11-04 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3216 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter.rb title CA BrightStor ARCserve for Laptops and Desktops LGServer rxsSetDataGrowthScheduleAndFilter Buffer Overflow description This module exploits a stack buffer overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request (rxsUseLicenseIni), an attacker could overflow the buffer and execute arbitrary code. id MSF:EXPLOIT/WINDOWS/BRIGHTSTOR/LGSERVER_RXSUSELICENSEINI last seen 2020-03-10 modified 2017-07-24 published 2008-08-02 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3216 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/brightstor/lgserver_rxsuselicenseini.rb title CA BrightStor ARCserve for Laptops and Desktops LGServer Buffer Overflow
Nessus
NASL family | Windows |
NASL id | CA_BABLD_LGSERVER_RCE1.NASL |
description | According to the version of rxRPC.dll installed on the remote host, the Computer Associates product is affected by multiple vulnerabilities that could allow a remote attacker to execute arbitrary code on the host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 69317 |
published | 2013-08-13 |
reporter | This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/69317 |
title | CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Remote Vulnerabilities |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/83135/lgserver_rxsuselicenseini.rb.txt id PACKETSTORM:83135 last seen 2016-12-05 published 2009-11-26 reporter MC source https://packetstormsecurity.com/files/83135/CA-BrightStor-ARCserve-for-Laptops-Desktops-LGServer-Buffer-Overflow.html title CA BrightStor ARCserve for Laptops & Desktops LGServer Buffer Overflow data source https://packetstormsecurity.com/files/download/95525/lgserver_rxssetdatagrowthscheduleandfilter.rb.txt id PACKETSTORM:95525 last seen 2016-12-05 published 2010-11-05 reporter MC source https://packetstormsecurity.com/files/95525/CA-BrightStor-ARCserve-for-Laptops-Desktops-LGServer-rxsSetDataGrowthScheduleAndFilter-Buffer-Overflow.html title CA BrightStor ARCserve for Laptops & Desktops LGServer (rxsSetDataGrowthScheduleAndFilter) Buffer Overflow data source https://packetstormsecurity.com/files/download/95523/lgserver_multi.rb.txt id PACKETSTORM:95523 last seen 2016-12-05 published 2010-11-05 reporter MC source https://packetstormsecurity.com/files/95523/CA-BrightStor-ARCserve-for-Laptops-Desktops-LGServer-Multiple-Commands-Buffer-Overflow.html title CA BrightStor ARCserve for Laptops & Desktops LGServer Multiple Commands Buffer Overflow
Saint
bid 24348 description BrightStor ARCserve Backup LGServer directory traversal id misc_arcservecategory_lgserverauthuo osvdb 41350 title brightstor_arcserve_rxrreceivefile type remote bid 24348 description BrightStor ARCserve Backup LGServer rxrLogin buffer overflow id misc_arcservecategory_lgserverauthuo osvdb 41353 title brightstor_arcserve_rxrlogin type remote bid 24348 description CA ARCserve Backup for Laptops and Desktops LGServer password integer overflow id misc_arcservecategory_lgserverauthuo osvdb 41352 title brightstor_arcserve_lgserver_password type remote bid 24348 description BrightStor ARCserve Backup LGServer rxsUseLicenseIni buffer overflow id misc_arcservecategory_lgserverauthuo osvdb 35329 title brightstor_arcserve_rxsuselicenseini type remote
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 24348 CVE(CAN) ID: CVE-2007-3216,CVE-2007-5003,CVE-2007-5004,CVE-2007-5005,CVE-2007-5006 ARCServe Backup for Laptops and Desktops (L&D)是适用于中小业务的ARCServe Backup备份工具版本。 ARCserve L&D在处理RPC接口上的畸形请求数据时存在漏洞,远程攻击者可能利用此漏洞控制服务器或执行目录遍历。 ARCserve L&D使用TCP/1900端口做为RPC接口管理ARCserve L&D服务器,正常的通讯示例如下: 0000000027rxrLogin~~administrator --------------------------------------------- Field 1: 10-digit base10 command length field ("0000000027") Field 2: RPC command ("rxrLogin") Field 3: Constant Argument Delimiter ("~~") Field 4: Argument ("administrator") #1 认证用户名缓冲区溢出 rxRPC.dll的认证部分(通过TCP/1900访问)中存在栈溢出漏洞。合法的认证报文示例如下: 0000000013rxrLogin~~administrator 认证时使用wsprintfW将administrator参数拷贝到了栈上0x1AC大小的缓冲区,但没有执行字符串长度检查,如果在第一个认证请求中发送了超长用户名的话就可以触发可利用的溢出。 #2 认证口令缓冲区溢出 rxRPC.dll的认证部分存在栈溢出漏洞。带有口令的合法认证请求示例如下: 1: 0000000030rxrLogin~~administrator~~0000200 2: MyPasswordIs1234 第一个rxrLogin请求的第二个参数定义了下一个请求中所要发送口令的长度。尽管已经验证了第二个请求中的口令字符串长度为正确的长度,但没有对口令长度执行边界检查。如果在第二个请求中的超长口令指定了超长口令长度的话,就会溢出口令字符串目的地所使用的栈缓冲区。 #3 认证口令整数溢出 rxRPC.dll的认证部分存在栈溢出漏洞。带有无效口令的合法认证请求示例如下: 1: 0000000030rxrLogin~~administrator~~18 2: 000000000000000000 加密的无效口令可能导致可利用的情况: .text: 00231F24 mov cl, [esi+8] .text: 00231F27 and ecx, 0x0F .text: 00231F2A add esp, 8 .text: 00231F2D dec ecx ; XXXX Integer Overflow If ECX = 0 .text: 00231F2E mov [esp+0x7C+var_6C], eax .text: 00231F32 mov dwPasswordCopyLength, ecx .text: 00231F38 mov eax, ecx .text: 00231F3A lea esi, [esp+0x7C+var_6C] .text: 00231F3E mov edi, ebx .text: 00231F40 shr ecx, 2 .text: 00231F43 rep movs ; XXXX EXCEPTION: HITS PAGE BOUNDARY XXXX 源缓冲区中的数据包含有大量不可控的数据,但还存在用户名的拷贝,因此如果在原始报文中指定了超长用户名的话就会覆盖异常处理器。 #4 任意文件上传 rxRPC.dll的未经认证通讯存在任意文件上传漏洞。上传请求的文件示例如下: 1: 0000000056rxrReceiveFileFromServer~~8~~test1234.txt~~4~~3675727989 2: 0000000031~~<file_contents> 请求的第一个参数指定了rxrReceiveFileFromServer的子命令,数字8表示文件会上传到ARCserve L&D的安装目录;第二个参数指定了文件目标名称;第三个参数指定了目标文件的长度;第五个参数指定了入站文件的CRC32哈希。 但rxRPC.dll没有防范通过子函数8的目录遍历,因此如果文件名中包含有“..\”的话,就可能导致以系统级权限向任意目录写入任意文件。 #5 多个类似的缓冲区溢出 有八个通过TCP/1900端口可访问的函数中存在缓冲区溢出,示例如下: rxsUseLicenseIni~~<overflow> rxsLicGetSiteId~~<overflow> rxsGetLogFileNames~~<overflow>~~40000 rxsGetBackupLog~~aa~~<overflow>~~40000 rxsBackupComplete~~aa~~aa~~aa~~<overflow>~~aa rxsSetDataGrowthScheduleAndFilter~~aa~~aa~~aa~~aa~~<overflow> rxsSetDefaultConfigName~~<overflow> rxrSetMessageLogSettings~~65~~45~~79~~65~~<overflow>~~52~65~73~65~61~72~63~68~21 Computer Associates Protection Suites r2 Computer Associates ARCserve Backup (L&D) r4.0 Computer Associates ARCserve Backup (L&D) r11.5 Computer Associates ARCserve Backup (L&D) r11.1 SP2 Computer Associates ARCserve Backup (L&D) r11.1 SP1 Computer Associates ARCserve Backup (L&D) r11.1 Computer Associates ARCserve Backup (L&D) r11.0 Computer Associates Desktop Management Suite 11.2 Computer Associates Desktop Management Suite 11.1 Computer Associates Desktop Management Suite 11.0 临时解决方法: * 在主机禁用TCP/1900端口。 厂商补丁: Computer Associates ------------------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href="http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp" target="_blank">http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp</a> |
id | SSV:2247 |
last seen | 2017-11-19 |
modified | 2007-09-25 |
published | 2007-09-25 |
reporter | Root |
title | CA ARCserve Backup多个远程溢出及目录遍历漏洞 |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=599
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=599
- http://osvdb.org/35329
- http://osvdb.org/35329
- http://research.eeye.com/html/advisories/published/AD20070920.html
- http://research.eeye.com/html/advisories/published/AD20070920.html
- http://research.eeye.com/html/advisories/upcoming/20070604.html
- http://research.eeye.com/html/advisories/upcoming/20070604.html
- http://secunia.com/advisories/25606
- http://secunia.com/advisories/25606
- http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/bsabld-securitynotice.asp
- http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/bsabld-securitynotice.asp
- http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp
- http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp
- http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006
- http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006
- http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35673
- http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35673
- http://www.securityfocus.com/archive/1/480252/100/100/threaded
- http://www.securityfocus.com/archive/1/480252/100/100/threaded
- http://www.securityfocus.com/bid/24348
- http://www.securityfocus.com/bid/24348
- http://www.securitytracker.com/id?1018216
- http://www.securitytracker.com/id?1018216
- http://www.securitytracker.com/id?1018728
- http://www.securitytracker.com/id?1018728
- http://www.vupen.com/english/advisories/2007/2121
- http://www.vupen.com/english/advisories/2007/2121
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34805
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34805