Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

               ESB-2009.0427 -- [HP-UX][Tru64][Solaris][AIX]
                    ARCserve: Multiple Vulnerabilities
                                4 May 2009


        AusCERT Security Bulletin Summary

Product:              ARCserve
Publisher:            Computer Associates
Operating System:     Solaris
Impact:               Increased Privileges
                      Denial of Service
Access:               Remote/Unauthenticated
CVE Names:            CVE-2004-0747 CVE-2003-0132

Original Bulletin:    

- --------------------------BEGIN INCLUDED TEXT--------------------

Title: CA20090429-01: CA ARCserve Backup Apache HTTP Server 
Multiple Vulnerabilities

CA Advisory Reference: CA20090429-01

CA Advisory Date: 2009-04-29

Reported By:
Apache Software Foundation
David Endler of iDefense
Ulf Harnhammar for SITIC, Swedish IT Incident Centre

Impact: A remote attacker can exploit a buffer overflow to gain 
apache privileges, or cause a denial of service.

Summary: CA ARCserve Backup on Solaris, Tru64, HP-UX, and AIX 
contains multiple vulnerabilities in the Apache HTTP Server 
version as shipped with ARCserve Backup. CA has issued updates 
that contain version 2.0.63 of the Apache HTTP Server to address 
the vulnerabilities. Refer to the References section for a list of 
resolved issues by CVE identifier.

Mitigating Factors: None

Severity: CA has given these vulnerabilities a Medium risk rating.

Affected Products:
CA ARCserve Backup r11.5 Solaris
CA ARCserve Backup r11.5 Tru64
CA ARCserve Backup r11.5 HP-UX
CA ARCserve Backup r11.5 AIX

Non-Affected Products:
CA ARCserve Backup r11.5 Windows
CA ARCserve Backup r11.5 Linux

Affected Platforms:

Status and Recommendation:
CA has issued the following patches to address the 

CA ARCserve Backup r11.5 Solaris:

CA ARCserve Backup r11.5 Tru64:

CA ARCserve Backup r11.5 HP-UX:

CA ARCserve Backup r11.5 AIX:

How to determine if you are affected:

1. From the command line, run the following to print the version 
   of the Apache HTTP Server included with ARCserve Backup:

      $BAB_HOME/httpd/httpd -v

      Note: On HP-UX the shared library path needs to be modified 
            prior to running the httpd command:

      export SHLIB_PATH

2. If the displayed version is less than 2.0.63, then the 
   installation may be vulnerable.

As a workaround solution, disable the Apache HTTP Server with the 
"stopgui" command. To re-enable the server, run "startgui".

Stopping the Apache HTTP Server will prevent the ARCserve user 
from performing GUI operations. Most of the operations provided by 
the GUI can be accomplished via the command line.

Alternatively, restrict remote network access to reduce exposure.

References (URLs may wrap):
CA Support:
CA20090429-01: Security Notice for CA ARCserve Backup Apache HTTP 
Solution Document Reference APARs:
RO06786, RO06788, RO06789, RO06791
CA Security Response Blog posting:
CA20090429-01: CA ARCserve Backup Apache HTTP Server Multiple 
Reported By: 
Apache Software Foundation
David Endler of iDefense
Ulf Harnhammar for SITIC, Swedish IT Incident Centre
CVE References:
OSVDB References: Pending

Changelog for this advisory:
v1.0 - Initial Release

Customers who require additional information should contact CA
Technical Support at https://support.ca.com.

For technical questions or comments related to this advisory, 
please send email to vuln AT ca DOT com.

If you discover a vulnerability in CA products, please report your 
findings to the CA Product Vulnerability Response Team.

Ken Williams, Director ; 0xE2941985
CA Product Vulnerability Response Team

CA, 1 CA Plaza, Islandia, NY 11749
Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2009 CA. All rights reserved.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.

Comment: http://www.auscert.org.au/render.html?it=1967