Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2009.0427 -- [HP-UX][Tru64][Solaris][AIX] ARCserve: Multiple Vulnerabilities 4 May 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ARCserve Publisher: Computer Associates Operating System: Solaris Tru64 HP-UX AIX Impact: Increased Privileges Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2004-0747 CVE-2003-0132 Original Bulletin: https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147 - --------------------------BEGIN INCLUDED TEXT-------------------- Title: CA20090429-01: CA ARCserve Backup Apache HTTP Server Multiple Vulnerabilities CA Advisory Reference: CA20090429-01 CA Advisory Date: 2009-04-29 Reported By: Apache Software Foundation David Endler of iDefense Ulf Harnhammar for SITIC, Swedish IT Incident Centre Impact: A remote attacker can exploit a buffer overflow to gain apache privileges, or cause a denial of service. Summary: CA ARCserve Backup on Solaris, Tru64, HP-UX, and AIX contains multiple vulnerabilities in the Apache HTTP Server version as shipped with ARCserve Backup. CA has issued updates that contain version 2.0.63 of the Apache HTTP Server to address the vulnerabilities. Refer to the References section for a list of resolved issues by CVE identifier. Mitigating Factors: None Severity: CA has given these vulnerabilities a Medium risk rating. Affected Products: CA ARCserve Backup r11.5 Solaris CA ARCserve Backup r11.5 Tru64 CA ARCserve Backup r11.5 HP-UX CA ARCserve Backup r11.5 AIX Non-Affected Products: CA ARCserve Backup r11.5 Windows CA ARCserve Backup r11.5 Linux Affected Platforms: Solaris Tru64 HP-UX AIX Status and Recommendation: CA has issued the following patches to address the vulnerabilities. CA ARCserve Backup r11.5 Solaris: RO06786 CA ARCserve Backup r11.5 Tru64: RO06788 CA ARCserve Backup r11.5 HP-UX: RO06789 CA ARCserve Backup r11.5 AIX: RO06791 How to determine if you are affected: 1. From the command line, run the following to print the version of the Apache HTTP Server included with ARCserve Backup: $BAB_HOME/httpd/httpd -v Note: On HP-UX the shared library path needs to be modified prior to running the httpd command: SHLIB_PATH=$SHLIB_PATH:$BAB_HOME/httpd/lib export SHLIB_PATH 2. If the displayed version is less than 2.0.63, then the installation may be vulnerable. Workaround: As a workaround solution, disable the Apache HTTP Server with the "stopgui" command. To re-enable the server, run "startgui". Stopping the Apache HTTP Server will prevent the ARCserve user from performing GUI operations. Most of the operations provided by the GUI can be accomplished via the command line. Alternatively, restrict remote network access to reduce exposure. References (URLs may wrap): CA Support: https://support.ca.com/ CA20090429-01: Security Notice for CA ARCserve Backup Apache HTTP Server https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=2051 47 Solution Document Reference APARs: RO06786, RO06788, RO06789, RO06791 CA Security Response Blog posting: CA20090429-01: CA ARCserve Backup Apache HTTP Server Multiple Vulnerabilities http://community.ca.com/blogs/casecurityresponseblog/archive/2009/04/29. aspx Reported By: Apache Software Foundation David Endler of iDefense Ulf Harnhammar for SITIC, Swedish IT Incident Centre CVE References: CVE-2004-0747 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0747 CVE-2003-0132 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0132 OSVDB References: Pending http://osvdb.org/ Changelog for this advisory: v1.0 - Initial Release Customers who require additional information should contact CA Technical Support at https://support.ca.com. For technical questions or comments related to this advisory, please send email to vuln AT ca DOT com. If you discover a vulnerability in CA products, please report your findings to the CA Product Vulnerability Response Team. https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=1777 82 Regards, Ken Williams, Director ; 0xE2941985 CA Product Vulnerability Response Team CA, 1 CA Plaza, Islandia, NY 11749 Contact http://www.ca.com/us/contact/ Legal Notice http://www.ca.com/us/legal/ Privacy Policy http://www.ca.com/us/privacy/ Copyright (c) 2009 CA. All rights reserved. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFJ/i/nNVH5XJJInbgRAtDuAKCBSA+BzSWcuMNrYNaTGjEuuLyqSQCeL0Rz RkJbImtVZaMGxtRw+aH+b60= =ZBG+ -----END PGP SIGNATURE-----