exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CA ARCserve Backup Denial Of Service

CA ARCserve Backup Denial Of Service
Posted Mar 21, 2012
Authored by Kevin Kotas | Site www3.ca.com

CA Technologies Support is alerting customers to a potential risk with CA ARCserve Backup for Windows. A vulnerability exists that can allow a remote attacker to cause a denial of service condition. CA Technologies has issued fixes to address the vulnerability. The vulnerability occurs due to insufficient validation of certain network requests. An attacker can potentially use the vulnerability to disable network services.

tags | advisory, remote, denial of service
systems | windows
advisories | CVE-2012-1662
SHA-256 | f6cc7aa2a2c098a2e8ed419d61aa4d65e98cc20b7bdc4c73e4cfe07ba7fc117b

CA ARCserve Backup Denial Of Service

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

CA20120320-01: Security Notice for CA ARCserve Backup

Issued: March 20, 2012

CA Technologies Support is alerting customers to a potential risk
with CA ARCserve Backup for Windows. A vulnerability exists that can
allow a remote attacker to cause a denial of service condition. CA
Technologies has issued fixes to address the vulnerability.

The vulnerability, CVE-2012-1662, occurs due to insufficient
validation of certain network requests. An attacker can potentially
use the vulnerability to disable network services.

Risk Rating

Medium

Platform

Windows

Affected Products

CA ARCserve Backup for Windows r12.0, r12.0 SP1, r12.0 SP2
CA ARCserve Backup for Windows r12.5, r12.5 SP1
CA ARCserve Backup for Windows r15, r15 SP1
CA ARCserve Backup for Windows r16

Non-Affected Products

CA ARCserve Backup for Windows r12.5 SP2
CA ARCserve Backup for Windows r16 SP1

How to determine if the installation is affected

CA ARCserve Backup for Windows r12.5:

Run the ARCserve Backup Manager. From the Windows Start menu, the
program can be found under Programs->CA->ARCserve Backup->Manager.
Click Help->About CA ARCserve Backup. This screen will indicate the
service pack level. If the displayed service pack level is prior to
SP2, the installation is vulnerable.

CA ARCserve Backup for Windows r15:

1. Run the ARCserve Patch Management utility. From the Windows
Start menu, the program can be found under Programs->CA->ARCserve
Patch Management->Patch Status.

2. The main patch status screen will indicate if the patch in the
below table is applied. If the patch is not applied, then the
installation is vulnerable.

Product
Patch

CA ARCserve Backup for Windows r15:
RO42050

For more information on the ARCserve Patch Management utility,
read document TEC446265.

CA ARCserve Backup for Windows r16.0:

Run the ARCserve Backup Manager. From the Windows Start menu, the
program can be found under Programs->CA->ARCserve Backup->Manager.
Click Help->About CA ARCserve Backup. This screen will indicate the
service pack level. If the displayed service pack level is prior to
SP1, the installation is vulnerable.

Solution

CA ARCserve Backup for Windows r12.0:
Update to CA ARCserve Backup for Windows r16 SP1.

CA ARCserve Backup for Windows r12.5:
Update to r12.5 service pack 2 with RO35881.

CA ARCserve Backup for Windows r15:
Install RO42050.

CA ARCserve Backup for Windows r16:
Update to r16 service pack 1 with RO35289.

References

CVE-2012-1662 - ARCserve Backup denial of service

CA20120320-01: Security Notice for CA ARCserve Backup
(url line wraps)
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7
b983E3A52-8374-410A-82BD-B8788733C70F%7d

Change History

Version 1.0: Initial Release

If additional information is required, please contact CA Technologies
Support at http://support.ca.com/

If you discover a vulnerability in CA Technologies products,
please report your findings to the CA Technologies Product
Vulnerability Response Team:
(url line wraps)
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=17
7782

Regards,

Kevin Kotas
CA Technologies Product Vulnerability Response Team

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQEVAwUBT2o60ZI1FvIeMomJAQFS2QgAqLVN1RfJSdRiDC0XsR7nBhuESrufQjub
o5S3XSJVvdDaZ8RxR14hA7hrzFukUhviZp0QuJ0U1+xcuzntvYWmKfKbrQDAISC2
CTU1NkN3/RLOaswOQKO08g9gr30zglhp0jztOYp9jv/s8V+ULF1Q7uymrnvGDzK4
9dlk8VHaXKbmgRX6L9GSr1IhX+0KzUJ8dqo+7PsLCrhcSnlmRQyOFSYU3SJcqyqM
nyky1lmdD/3Gc41Ee10/yHXR9F/yZKPlZpI2R12+9K3a8s1+je/Jtruoqw7D1aUb
ofNz5PiQBrGc+U+zIuAEiCekUONNrZ9palWZs2EiIZbtvxmhz9CKww==
=3zDm
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close