TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Robert Comer
from: Ellen K
date: 2005-08-05 00:27:56
subject: Re: ARCserve

I use the built-in SQL Server backup functionality to back up my databases
to another server on the network.  Then Veritas comes in the day and backs
up the backup files from the other server to tape.  That way my backup can
be part of my nightly maintenance which includes some data scrubbing etc
(which wouldn't work if I used a third-party backup like the Veritas SQL
Agent, because those are strictly pull, and to integrate the backup with
the other stuff I need push), and Veritas gets to back up my backup files
when it has free time.  (It's booked solid every night.)

> From: "Robert Comer" 
> I use both Arcserve and SQL Server -- I use SQL Server's built in
> functionality, not the SQL Server client.  It's too expensive for one thing,
> but I'm not worried about security for it -- it's behind a firewall here...
> - Bob Comer
> "Ellen K"  wrote in message
> news:609ca1.03b6d5{at}harborwebs.com...
>> Another good reason for using the SQL Server built-in backup functionality
>> rather than a third-party tool
>> 
>>> From: "Geo" 
>>> CA BrightStor ARCserve Backup Agent for MS SQL Server Buffer Overflow
>>> iDEFENSE Security Advisory 08.02.05
>>> www.idefense.com/application/poi/display?id=287&type=vulnerabilities
>>> August 2, 2005
>>> I. BACKGROUND
>>> BrightStor ARCserve Backup for Windows delivers backup and restore
>>> protection for all Windows server systems as well as Windows, Linux,
>>> Mac OS X and UNIX client environments.
>>> http://www3.ca.com/Solutions/ProductFamily.asp?ID=115
>>> II. DESCRIPTION
>>> Remote exploitation of a buffer overflow in the Backup Agent for
>>> Microsoft SQL Server within Computer Associates' BrightStor ARCserve
>>> Backup Agent for SQL allows an attacker to execute arbitrary code with
>>> SYSTEM privileges.
>>> BrightStor ARCserve Backup Agent for Microsoft SQL Server is a component
>>> of the BrightStor ARCserve Backup system for handling backups of
>>> Microsoft SQL server data. When a string with a length over 3168 bytes,
>>> is sent to the listening port, 6070 by default, a stack based buffer
>>> overflow occurs.
>>> III. ANALYSIS
>>> Successful exploitation allows remote attackers to execute arbitrary
>>> code with SYSTEM level privileges. This allows for complete system
>>> compromise including the installation or removal of software and access
>>> to any file on the system.
>>> IV. DETECTION
>>> iDEFENSE has confirmed the existence of this vulnerability in Computer
>>> Associates BrightStor ARCserve Backup Agent for Microsoft SQL Server
>>> version 11.0. It is suspected that all versions are vulnerable.
>>> V. WORKAROUND
>>> Restrict remote access at the network boundary, unless remote parties
>>> require service. Access to the affected host should be filtered at the
>>> network boundary if global accessibility is not required. Restricting
>>> access to only trusted hosts and networks may reduce the likelihood of
>>> exploitation.
>>> VI. VENDOR RESPONSE
>>> A vendor advisory for this vulnerability can be found at:
>>> http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33239
>>> VII. CVE INFORMATION
>>> The Common Vulnerabilities and Exposures (CVE) project has assigned the
>>> name CAN-2005-1272 to this issue. This is a candidate for inclusion in
>>> the CVE list (http://cve.mitre.org), which standardizes names for
>>> security problems.
>>> VIII. DISCLOSURE TIMELINE
>>> 04/25/2005  Initial vendor notification
>>> 04/25/2005  Initial vendor response
>>> 08/02/2005  Coordinated public disclosure
>>> IX. CREDIT
>>> The discoverer of this vulnerability wishes to remain anonymous.
>>> Get paid for vulnerability research
>>> http://www.idefense.com/poi/teams/vcp.jsp
>>> Free tools, research and upcoming events
>>> http://labs.idefense.com
>>> X. LEGAL NOTICES
>>> Copyright (c) 2005 iDEFENSE, Inc.
>>> Permission is granted for the redistribution of this alert
>>> electronically. It may not be edited in any way without the express
>>> written consent of iDEFENSE. If you wish to reprint the whole or any
>>> part of this alert in any other medium other than electronically, please
>>> email customerservice{at}idefense.com for permission.
>>> Disclaimer: The information in the advisory is believed to be accurate
>>> at the time of publishing based on currently available information. Use
>>> of the information constitutes acceptance for use in an AS IS condition.
>>> There are no warranties with regard to this information. Neither the
>>> author nor the publisher accepts any liability for any direct, indirect,
>>> or consequential loss or damage arising from use of, or reliance on,
>>> this information.

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.