| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: ARCserve |
From: "Robert Comer"
I use both Arcserve and SQL Server -- I use SQL Server's built in
functionality, not the SQL Server client. It's too expensive for one
thing, but I'm not worried about security for it -- it's behind a firewall
here...
- Bob Comer
"Ellen K" wrote in message
news:609ca1.03b6d5{at}harborwebs.com...
> Another good reason for using the SQL Server built-in backup functionality
> rather than a third-party tool
>
>> From: "Geo"
>> CA BrightStor ARCserve Backup Agent for MS SQL Server Buffer Overflow
>> iDEFENSE Security Advisory 08.02.05
>> www.idefense.com/application/poi/display?id=287&type=vulnerabilities
>> August 2, 2005
>> I. BACKGROUND
>> BrightStor ARCserve Backup for Windows delivers backup and restore
>> protection for all Windows server systems as well as Windows, Linux,
>> Mac OS X and UNIX client environments.
>> http://www3.ca.com/Solutions/ProductFamily.asp?ID=115
>> II. DESCRIPTION
>> Remote exploitation of a buffer overflow in the Backup Agent for
>> Microsoft SQL Server within Computer Associates' BrightStor ARCserve
>> Backup Agent for SQL allows an attacker to execute arbitrary code with
>> SYSTEM privileges.
>> BrightStor ARCserve Backup Agent for Microsoft SQL Server is a component
>> of the BrightStor ARCserve Backup system for handling backups of
>> Microsoft SQL server data. When a string with a length over 3168 bytes,
>> is sent to the listening port, 6070 by default, a stack based buffer
>> overflow occurs.
>> III. ANALYSIS
>> Successful exploitation allows remote attackers to execute arbitrary
>> code with SYSTEM level privileges. This allows for complete system
>> compromise including the installation or removal of software and access
>> to any file on the system.
>> IV. DETECTION
>> iDEFENSE has confirmed the existence of this vulnerability in Computer
>> Associates BrightStor ARCserve Backup Agent for Microsoft SQL Server
>> version 11.0. It is suspected that all versions are vulnerable.
>> V. WORKAROUND
>> Restrict remote access at the network boundary, unless remote parties
>> require service. Access to the affected host should be filtered at the
>> network boundary if global accessibility is not required. Restricting
>> access to only trusted hosts and networks may reduce the likelihood of
>> exploitation.
>> VI. VENDOR RESPONSE
>> A vendor advisory for this vulnerability can be found at:
>> http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33239
>> VII. CVE INFORMATION
>> The Common Vulnerabilities and Exposures (CVE) project has assigned the
>> name CAN-2005-1272 to this issue. This is a candidate for inclusion in
>> the CVE list (http://cve.mitre.org), which standardizes names for
>> security problems.
>> VIII. DISCLOSURE TIMELINE
>> 04/25/2005 Initial vendor notification
>> 04/25/2005 Initial vendor response
>> 08/02/2005 Coordinated public disclosure
>> IX. CREDIT
>> The discoverer of this vulnerability wishes to remain anonymous.
>> Get paid for vulnerability research
>> http://www.idefense.com/poi/teams/vcp.jsp
>> Free tools, research and upcoming events
>> http://labs.idefense.com
>> X. LEGAL NOTICES
>> Copyright (c) 2005 iDEFENSE, Inc.
>> Permission is granted for the redistribution of this alert
>> electronically. It may not be edited in any way without the express
>> written consent of iDEFENSE. If you wish to reprint the whole or any
>> part of this alert in any other medium other than electronically, please
>> email customerservice{at}idefense.com for permission.
>> Disclaimer: The information in the advisory is believed to be accurate
>> at the time of publishing based on currently available information. Use
>> of the information constitutes acceptance for use in an AS IS condition.
>> There are no warranties with regard to this information. Neither the
>> author nor the publisher accepts any liability for any direct, indirect,
>> or consequential loss or damage arising from use of, or reliance on,
>> this information.
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.