CA ARCserve Backup Mediasvr.exe and caloggerd.exe Vulnerabilities
Security Notice

Last Updated: May 16, 2007

CA is aware that two functional exploit code samples were publicized on May 16, 2007. These two denial of service exploits are associated with vulnerabilities in CA ARCserve Backup Mediasvr.exe and caloggerd.exe.

We have verified that vulnerabilities do exist, and we are now working on a patch to address the issues. We have given these vulnerabilities a Medium risk rating.

To mitigate the Mediasvr.exe vulnerability, CA recommends that CA ARCserve Backup users implement the following temporary workaround:

  1. Rename the "mediasvr.exe" file to a non-functional file name, such as "mediasvc.exe.disable".
  2. Then restart the CA BrightStor Tape Engine service.

This will disable the command line functionality in the product (i.e. command line utilities such as ca_backup, ca_restore, ca_merge, ca_qmgr, ca_scan, etc will not work).

After we have completed our analysis of these issues, we will post an update and patches on the CA SupportConnect website. If additional information is required, please contact CA Technical Support at

If you discover a vulnerability in CA products, please report your findings to, or utilize our "Submit a Vulnerability" form at

Chat with CA

Just give us some brief information and we'll connect you to the right CA ExpertCA sales representative.

Our hours of availability are 8AM - 5PM CST.

All Fields Required


We're matching your request.

Unfortunately, we can't connect you to an agent. If you are not automatically redirected please click here.

  • {{}} will be helping you today.

    View Profile

  • Transfered to {{}}

    {{}} joined the conversation

    {{}} left the conversation

  • Your chat with {{$storage.chatSession.messages[$index - 1]}} has ended.
    Thank you for your interest in CA.

    Rate Your Chat Experience.


agent is typing