Date: 24 October 2006
References: AL-2006.0094
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
AusCERT Update AU-2006.0040 - [Win]
CA BrightStor ARCserve Backup and CA Protection Suites - previous update
did not fix remote vulnerability
24 October 2006
AusCERT Update Summary
----------------------
Product: BrightStor ARCserve Backup r11.5 SP1 and below
(SP2 does not have this vulnerability)
BrightStor ARCserve Backup r11.1
BrightStor ARCserve Backup for Windows r11
BrightStor Enterprise Backup 10.5
BrightStor ARCserve Backup v9.01
CA Server Protection Suite r2
CA Business Protection Suite r2
CA Business Protection Suite for Microsoft Small Business
Server Standard Edition r2
CA Business Protection Suite for Microsoft Small Business
Server Premium Edition r2
Operating System: Windows
Impact: Administrator Compromise
Access: Remote/Unauthenticated
CVE Names: CVE-2006-5142 CVE-2006-5143
Member content until: Tuesday, November 21 2006
Ref: AL-2006.0094
OVERVIEW:
CA's previous software update failed to properly fix one of the
serious remote vulnerabilities reported in AL-2006.0094 for
Brightstor ARCserve Backup and CA Protection Suites. Systems with
the original update applied are still vulnerable.
CA have now released new software updates which must be applied in
addition to the updates released with the original bulletin.
IMPACT:
A remote, unauthenticated attacker can potentially take complete
control of the vulnerable systems, executing arbitrary code with
SYSTEM privileges.
MITIGATION:
It is necessary to apply both the original fix [2] and the new
updated fix [3].
REFERENCES:
1. AusCERT Alert AL-2006.0094
http://www.auscert.org.au/6859
2. Original CA advisory
http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93775&date=2006/10
3. Updated CA advisory
http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=94397&date=2006/10
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBRT1lfCh9+71yA2DNAQL6oAP9FyLIr5FfrsWB4mUN2c4isYBRfV7ftMnZ
6andizBXjdHUiAlPP8JLB3TIFNFagumKAjUbs6vbDtTcVxLQK3gJOS2mi+VwqggT
uV+GSKdwqZAKNc9rLZ1ImRtdyvhr3dUUiNg4VaWLsbg/fHygF6zKHJj71rvYphxq
9/tHd1Enz9g=
=M28I
-----END PGP SIGNATURE-----
|