The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


CA20090429-01: CA ARCserve Backup Apache HTTP Server Multiple Vulnerabilities


<< Previous INDEX Search src / Print Next >>
Subject: CA20090429-01: CA ARCserve Backup Apache HTTP Server Multiple Vulnerabilities
Date: Thu, 30 Apr 2009 15:49:30 -0400
Message-ID: <649CDCB56C88AA458EFF2CBF494B620406D709AA@USILMS12.ca.com.>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: CA20090429-01: CA ARCserve Backup Apache HTTP Server Multiple Vulnerabilities
Thread-Index: AcnJzMbOYZpCaTwzR1Gqm+8HIF+ntA==
From: "Williams, James K" <James.Williams@ca.com.>
To: <bugtraq@securityfocus.com.>
X-OriginalArrivalTime: 30 Apr 2009 19:50:23.0412 (UTC) FILETIME=[E67B4740:01C9C9CC]
X-Virus-Scanned: antivirus-gw at tyumen.ru

Title: CA20090429-01: CA ARCserve Backup Apache HTTP Server=20
Multiple Vulnerabilities


CA Advisory Reference: CA20090429-01


CA Advisory Date: 2009-04-29


Reported By:
Apache Software Foundation
David Endler of iDefense
Ulf Harnhammar for SITIC, Swedish IT Incident Centre


Impact: A remote attacker can exploit a buffer overflow to gain=20
apache privileges, or cause a denial of service.


Summary: CA ARCserve Backup on Solaris, Tru64, HP-UX, and AIX=20
contains multiple vulnerabilities in the Apache HTTP Server=20
version as shipped with ARCserve Backup. CA has issued updates=20
that contain version 2.0.63 of the Apache HTTP Server to address=20
the vulnerabilities. Refer to the References section for a list of=20
resolved issues by CVE identifier.


Mitigating Factors: None


Severity: CA has given these vulnerabilities a Medium risk rating.


Affected Products:
CA ARCserve Backup r11.5 Solaris
CA ARCserve Backup r11.5 Tru64
CA ARCserve Backup r11.5 HP-UX
CA ARCserve Backup r11.5 AIX


Non-Affected Products:
CA ARCserve Backup r11.5 Windows
CA ARCserve Backup r11.5 Linux


Affected Platforms:
Solaris
Tru64
HP-UX
AIX


Status and Recommendation:
CA has issued the following patches to address the=20
vulnerabilities.

CA ARCserve Backup r11.5 Solaris:
RO06786

CA ARCserve Backup r11.5 Tru64:
RO06788

CA ARCserve Backup r11.5 HP-UX:
RO06789

CA ARCserve Backup r11.5 AIX:
RO06791


How to determine if you are affected:

1. From the command line, run the following to print the version=20
   of the Apache HTTP Server included with ARCserve Backup:

      $BAB_HOME/httpd/httpd -v

      Note: On HP-UX the shared library path needs to be modified=20
            prior to running the httpd command:

      SHLIB_PATH=3D$SHLIB_PATH:$BAB_HOME/httpd/lib
      export SHLIB_PATH

2. If the displayed version is less than 2.0.63, then the=20
   installation may be vulnerable.


Workaround:=20
As a workaround solution, disable the Apache HTTP Server with the=20
"stopgui" command. To re-enable the server, run "startgui".

Stopping the Apache HTTP Server will prevent the ARCserve user=20
from performing GUI operations. Most of the operations provided by=20
the GUI can be accomplished via the command line.

Alternatively, restrict remote network access to reduce exposure.


References (URLs may wrap):
CA Support:
https://support.ca.com/
CA20090429-01: Security Notice for CA ARCserve Backup Apache HTTP=20
   Server
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=3D205=
1
47
Solution Document Reference APARs:
RO06786, RO06788, RO06789, RO06791
CA Security Response Blog posting:
CA20090429-01: CA ARCserve Backup Apache HTTP Server Multiple=20
   Vulnerabilities
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/04/29.
aspx
Reported By:=20
Apache Software Foundation
David Endler of iDefense
Ulf Harnhammar for SITIC, Swedish IT Incident Centre
CVE References:
CVE-2004-0747
http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2004-0747
CVE-2003-0132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2003-0132
OSVDB References: Pending
http://osvdb.org/


Changelog for this advisory:
v1.0 - Initial Release


Customers who require additional information should contact CA
Technical Support at https://support.ca.com.

For technical questions or comments related to this advisory,=20
please send email to vuln AT ca DOT com.

If you discover a vulnerability in CA products, please report your=20
findings to the CA Product Vulnerability Response Team.
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=3D177=
7
82


Regards,
Ken Williams, Director ; 0xE2941985
CA Product Vulnerability Response Team


CA, 1 CA Plaza, Islandia, NY 11749
=09
Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2009 CA. All rights reserved.


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру