漏洞信息详情
CA BrightStor ARCServe BackUp Tape Engine服务远程代码执行漏洞
漏洞简介
BrightStor ARCserve Backup可为各种平台的服务器提供备份和恢复保护功能。
BrightStor ARCserve Backup在处理TCP/6502端口上请求时存在漏洞,远程攻击者可能利用此漏洞控制服务器。默认监听于TCP 6502端口的BrightStor ARCserve Backup的Tape Engine服务(tapeeng.exe)没有正确的处理RPC请求。在62b93df0-8b02-11ce-876c-00805f842837接口上Opnum 191指定了有漏洞的操作,允许通过控制栈上的变量重新定向代码,然后在以下调用中滥用了该变量:00264DFE CALL DWORD PTR DS:[EAX+C] ;EAX is controllable.成功利用这个漏洞的攻击者可以在有漏洞的系统上执行任意代码。
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
https://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO84985
https://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO84986
参考网址
来源:OSVDB
链接:http://osvdb.org/31327
来源:BID
链接:https://www.securityfocus.com/bid/22010
来源:SECTRACK
链接:http://securitytracker.com/id?1017506
来源:SECUNIA
链接:http://secunia.com/advisories/23648
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/456616/100/0/threaded
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2007/0154
来源:CONFIRM
链接:http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp
来源:MISC
链接:http://www.lssec.com/advisories/LS-20061002.pdf
来源:XF
链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/31442
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/456711
来源:CERT-VN
链接:http://www.kb.cert.org/vuls/id/662400
来源:MISC
链接:http://livesploit.com/advisories/LS-20061002.pdf
来源:MISC
链接:http://www.zerodayinitiative.com/advisories/ZDI-07-002.html
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/456637
受影响实体
- Ca Brightstor_arcserve_backup:9.01<!--2000-1-1-->
- Ca Brightstor_enterprise_backup:10.5<!--2000-1-1-->
- Ca Business_protection_suite:2.0<!--2000-1-1-->
- Ca Brightstor_arcserve_backup:11.5<!--2000-1-1-->
补丁
- CA BrightStor ARCServe BackUp Tape Engine服务远程代码执行漏洞的修复措施<!--2007-1-11-->
还没有评论,来说两句吧...