Security Notice for CA ARCserve Backup
caloggerd and xdr functions
Issued: May 19, 2008
CA's customer support is alerting customers to security risks associated with CA ARCserve Backup. Multiple vulnerabilities exist that can allow a remote attacker to cause a denial of service or execute arbitrary code. CA has issued patches to address the vulnerabilities.
The first vulnerability, CVE-2008-2241, is due to insufficient path verification by the logging service, caloggerd. An attacker can append data to arbitrary files, which can lead to system compromise.
The second vulnerability, CVE-2008-2242, is due to insufficient bounds checking by multiple xdr functions. An attacker can cause an overflow and execute arbitrary code.
Note: These issues only affect the server installation.
Windows, Linux/x86/IA-64/x86_64, Tru64, HP-UX, Solaris, AIX, Linux/s390
CA ARCserve Backup r11.5 (formerly BrightStor ARCserve Backup r11.5)
CA ARCserve Backup r11.1 (formerly BrightStor ARCserve Backup r11.1)
CA ARCserve Backup r11.0 (formerly BrightStor ARCserve Backup r11.0)
CA Server Protection Suite r2
CA Business Protection Suite r2
CA Business Protection Suite for Microsoft Small Business Server Standard Edition r2
CA Business Protection Suite for Microsoft Small Business Server Premium Edition r2
CA ARCserve Backup r12
CA ARCserve Backup r11.5 SP4
How to determine if the installation is affected:
- Using Windows Explorer, locate the file "caloggerd.exe". By default, the file is located in the "C:Program FilesCABrightStor ARCserve Backup" directory.
- Right click on the file and select Properties.
- Select the General tab.
- If the file timestamp is earlier than indicated in the below table, the installation is vulnerable.
|Product Version ||File Name ||Timestamp ||File Size |
|11.5 ||caloggerd.exe ||05/18/2007 10:55:48 ||299008 bytes |
|11.1 ||caloggerd.exe ||05/18/2007 11:30:52 ||286720 bytes |
* For Protection Suites r2 , use the file timestamp for CA ARCserve Backup r11.5
For Linux/x86/IA-64/x86_64, Tru64, HP-UX, Solaris, Linux/s390:
Examine the file RELVERSION to determine the version. This can be done with the following command from a shell:
If the build number is below 2427, the installation is vulnerable.
CA has issued the following patches and upgrades to address the vulnerabilities.
CA ARCserve Backup r11.5 Windows:
CA ARCserve Backup r11.1 Windows:
CA ARCserve Backup r11.0 Windows:
Upgrade to 11.1 and apply the latest patches.
CA Protection Suites r2:
The issues can also be addressed by applying CA ARCserve Backup 11.5 SP4 for Windows:
For CA ARCserve Backup r11.5 and r11.1 on *NIX platforms, upgrade to 11.5 SP3.
Note: The upgrade for 11.1 requires new license keys, which are available for free until December 31, 2008. Visit the following link for more information.
CA ARCserve Backup r11.5 Linux/x86/IA-64/x86_64:
CA ARCserve Backup r11.5 Tru64:
CA ARCserve Backup r11.5 HP-UX:
CA ARCserve Backup r11.5 Solaris:
CA ARCserve Backup r11.5 AIX:
CA ARCserve Backup r11.5 Linux/s390:
CA ARCserve Backup r11.1 Linux/x86/IA-64/x86_64:
CA ARCserve Backup r11.1 Tru64:
CA ARCserve Backup r11.1 HP-UX:
CA ARCserve Backup r11.1 Solaris:
CA ARCserve Backup r11.1 AIX:
CA ARCserve Backup r11.1 Linux/s390:
CVE-2008-2241 - caloggerd file appending
CVE-2008-2242 - xdr function buffer overflow vulnerability
CVE-2008-2241 - An anonymous researcher working with the iDefense VCP, Damian Put working with ZDI/TippingPoint
CVE-2008-2242 - An anonymous researcher working with the iDefense VCP, Damian Put working with ZDI/TippingPoint
Version 1.0: Initial Release
If additional information is required, please contact CA Technical Support at https://Support.ca.com.
If you discover a vulnerability in CA products, please report your findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability" form at https://www.ca.com/us/securityadvisor/vulninfo/submit.aspx.