Overview
The CA ARCserve Backup authentication service, caauthd.exe, is susceptible to a pre-authentication remote code execution vulnerability. Arbitrary code will run with NT AUTHORITY\SYSTEM privileges. CA ARCserve Backup r16 SP1 was reported to be vulnerable.
Description
The Offensive Security advisory states: By replacing a particular xdr_rwslist object expected in an RPC authentication packet (opcode 0x7a) with another xdr_rwobject, function sub_416E80 will call a non-existent or invalid virtual function (RWSlistCollectables::at) that can be controlled by the attacker. Authentication is not required to trigger the bug and successful exploitation of this vulnerability for the caauthd.exe process will lead to remote code execution with NT AUTHORITY\SYSTEM privileges. Failed exploitation will lead to a denial of service. |
Impact
An unauthenticated attacker may be able to execute remote code with NT AUTHORITY\SYSTEM privileges. |
Solution
Apply a Patch
If you cannot patch for whatever reason please consider the following workarounds. |
Restrict access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 7.8 | E:POC/RL:OF/RC:C |
Environmental | 7.8 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Matteo Memelli of Offensive Security for reporting this vulnerability.
This document was written by Jared Allar.
Other Information
CVE IDs: | CVE-2012-2971 |
Date Public: | 2012-08-31 |
Date First Published: | 2012-10-30 |
Date Last Updated: | 2012-10-30 20:06 UTC |
Document Revision: | 25 |