The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of CA ARCserve Backup

vulnerability note CVE-2014-0160

OpenSSL: information disclosure via Heartbeat

Synthesis of the vulnerability

An attacker can use the Heartbeat protocol on an application compiled with OpenSSL, in order to obtain sensitive information, such as keys stored in memory.
Impacted products: Tomcat, ArubaOS, i-Suite, ProxyAV, ProxySG par Blue Coat, SGOS by Blue Coat, ARCserve Backup, ASA, Cisco Catalyst, IOS XE Cisco, Prime Infrastructure, Cisco PRSM, Cisco Router, Cisco CUCM, Cisco IP Phone, Cisco Unity ~ precise, XenDesktop, Clearswift Email Gateway, Clearswift Web Gateway, Debian, ECC, PowerPath, ArcGIS ArcView, ArcGIS for Desktop, ArcGIS for Server, Black Diamond, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiClient, FortiGate, FortiGate Virtual Appliance, FortiOS, FreeBSD, HP Diagnostics, LoadRunner, Performance Center, AIX, WebSphere MQ, IVE OS, Juniper J-Series, Junos OS, Junos Pulse, Juniper Network Connect, Juniper SA, Juniper UAC, LibreOffice, McAfee Email Gateway, ePO, GroupShield, McAfee NGFW, VirusScan, McAfee Web Gateway, Windows 8, Windows RT, MySQL Enterprise, NetBSD, OpenBSD, OpenSSL, openSUSE, Opera, Solaris, pfSense, HDX, RealPresence Collaboration Server, Polycom VBP, Puppet, RHEL, RSA Authentication Manager, SIMATIC, Slackware, Sophos AV, Splunk Enterprise, Stonesoft NGFW/VPN, stunnel, ASE, OfficeScan, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, VMware Player, vCenter Server, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation, Websense Email Security, Websense Web Filter, Websense Web Security.
Severity: 3/4.
Consequences: data reading.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 08/04/2014.
Identifiers: 1669839, 190438, 2076225, 2962393, c04236102, c04267775, c04286049, CA20140413-01, CERTFR-2014-ALE-003, CERTFR-2014-AVI-156, CERTFR-2014-AVI-161, CERTFR-2014-AVI-162, CERTFR-2014-AVI-167, CERTFR-2014-AVI-169, CERTFR-2014-AVI-177, CERTFR-2014-AVI-178, CERTFR-2014-AVI-179, CERTFR-2014-AVI-180, CERTFR-2014-AVI-181, CERTFR-2014-AVI-198, CERTFR-2014-AVI-199, CERTFR-2014-AVI-213, cisco-sa-20140409-heartbleed, CTX140605, CVE-2014-0160, CVE-2014-0346-REJECT, DSA-2896-1, DSA-2896-2, emr_na-c04236102-7, ESA-2014-034, ESA-2014-036, ESA-2014-075, FEDORA-2014-4879, FEDORA-2014-4910, FEDORA-2014-4982, FEDORA-2014-4999, FG-IR-14-011, FreeBSD-SA-14:06.openssl, Heartbleed, HPSBMU02995, HPSBMU03025, HPSBMU03040, ICSA-14-105-03, JSA10623, MDVSA-2014:123, MDVSA-2015:062, NetBSD-SA2014-004, openSUSE-SU-2014:0492-1, openSUSE-SU-2014:0560-1, openSUSE-SU-2014:0719-1, pfSense-SA-14_04.openssl, RHSA-2014:0376-01, RHSA-2014:0377-01, RHSA-2014:0378-01, RHSA-2014:0396-01, RHSA-2014:0416-01, SA40005, SA79, SB10071, SOL15159, SPL-82696, SSA:2014-098-01, SSA-635659, SSRT101565, USN-2165-1, VIGILANCE-VUL-14534, VMSA-2014-0004, VMSA-2014-0004.1, VMSA-2014-0004.2, VMSA-2014-0004.3, VMSA-2014-0004.6, VMSA-2014-0004.7, VU#720951.

Description of the vulnerability

The Heartbeat extension of TLS (RFC 6520) provides a keep-alive feature, without performing a renegotiation. It exchanges random data in a payload.

Version 1.0.1 of OpenSSL implements Heartbeat, which is enabled by default. The [d]tls1_process_heartbeat() function manages Heartbeat messages. However, it does not check the size of random data, and continues to read after the end of the payload, and then sends the full memory area (up to 64kb) to the peer (client or server).

An attacker can therefore use the Heartbeat protocol on an application compiled with OpenSSL, in order to obtain sensitive information, such as keys stored in memory.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2012-2971 CVE-2012-2972

CA ARCserve Backup: two vulnerabilities

Synthesis of the vulnerability

An attacker can use two vulnerabilities of CA ARCserve Backup, in order to execute code or to create a denial of service.
Impacted products: ARCserve Backup.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights, denial of service on service.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 19/10/2012.
Identifiers: BID-56116, CA20121018-01, CERTA-2012-AVI-591, CVE-2012-2971, CVE-2012-2972, VIGILANCE-VUL-12085, VU#408099, VU#936363.

Description of the vulnerability

Two vulnerabilities were announced in CA ARCserve Backup.

An attacker can send a malicious RPC query to the server, to generate a buffer overflow, leading to code execution. [severity:3/4; CVE-2012-2971, VU#936363]

An attacker can send several malicious RPC queries to the server/agent, to stop it. [severity:2/4; CVE-2012-2972, VU#408099]

An attacker can therefore use two vulnerabilities of CA ARCserve Backup, in order to execute code or to create a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2012-0691 CVE-2012-0692

CA ARCserve Backup, Workload Automation: two vulnerabilities of CA License

Synthesis of the vulnerability

A local attacker can use two vulnerabilities of CA License, in order to elevate his privileges or to create a file, via CA ARCserve Backup or CA Workload Automation.
Impacted products: ARCserve Backup, CA Workload Automation.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, data creation/edition.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 02/10/2012.
Identifiers: BID-55737, CA20121001-01, CERTA-2012-AVI-543, CVE-2012-0691, CVE-2012-0692, VIGILANCE-VUL-11991.

Description of the vulnerability

The CA ARCserve Backup and CA Workload Automation products contain the CA License component. However, this component is impacted by two vulnerabilities.

A local attacker can execute commands with system privileges. [severity:2/4; CVE-2012-0691]

A local attacker can create or alter files with elevated privileges. [severity:2/4; CVE-2012-0692]

A local attacker can therefore use two vulnerabilities of CA License, in order to elevate his privileges or to create a file, via CA ARCserve Backup or CA Workload Automation.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2012-1662

CA ARCserve Backup: denial of service

Synthesis of the vulnerability

A network attacker can send malformed queries, in order to stop services of CA ARCserve Backup.
Impacted products: ARCserve Backup.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: intranet client.
Creation date: 21/03/2012.
Identifiers: BID-52655, CA20120320-01, CERTA-2012-AVI-168, CVE-2012-1662, VIGILANCE-VUL-11463.

Description of the vulnerability

The CA ARCserve Backup for Windows product installs services listening on ports.

A network attacker can send malformed queries, in order to stop services of CA ARCserve Backup.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert 10066

CA ARCserve Backup: buffer overflow

Synthesis of the vulnerability

An attacker can send a malicious RPC query, in order to generate a buffer overflow in CA ARCserve Backup, leading to code execution.
Impacted products: ARCserve Backup.
Severity: 3/4.
Consequences: user access/rights.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 22/10/2010.
Identifiers: BID-62582, VIGILANCE-VUL-10066.

Description of the vulnerability

Two vulnerabilities were announced in CA ARCserve Backup.

An attacker can send a RPC query to ARCserve Message Engine (port 6504) in order to create a buffer overflow. [severity:3/4]

An attacker can send a RPC query to ARCserve Message Tape (port 6502) in order to create a buffer overflow. [severity:3/4; BID-62582]

An attacker can therefore send a malicious RPC query, in order to generate a buffer overflow in CA ARCserve Backup, leading to code execution.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2010-2157

CA ARCserve Backup: information disclosure

Synthesis of the vulnerability

A local attacker can use a vulnerability of CA ARCserve Backup, in order to obtain information.
Impacted products: ARCserve Backup.
Severity: 1/4.
Consequences: data reading.
Provenance: user account.
Creation date: 04/06/2010.
Identifiers: BID-40566, CA20100603-01, CERTA-2010-AVI-240, CVE-2010-2157, VIGILANCE-VUL-9683.

Description of the vulnerability

The CA ARCserve Backup product manages backups.

A local attacker can use a vulnerability of CA ARCserve Backup, in order to obtain information.

 This vulnerability could for example be used to access to backups.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about CA ARCserve Backup: