BrightStor ARCserve/Enterprise Backup UDP Probe Remote Buffer Overflow Vulnerability

BID:12491

Info

BrightStor ARCserve/Enterprise Backup UDP Probe Remote Buffer Overflow Vulnerability

Bugtraq ID: 12491
Class: Boundary Condition Error
CVE:
Remote: Yes
Local: No
Published: Feb 08 2005 12:00AM
Updated: Feb 08 2005 12:00AM
Credit: This vulnerability was discovered by two individuals, one of whom is Patrik Karlsson. The other wishes to remain anonymous.
Vulnerable: Computer Associates BrightStor Enterprise Backup for Windows 64 bit 10.5
Computer Associates BrightStor Enterprise Backup 10.5
Computer Associates BrightStor Enterprise Backup 10.0
Computer Associates BrightStor ARCServe Backup for Windows 64 bit 11.1
Computer Associates BrightStor ARCServe Backup for Windows 64 bit 11.0
Computer Associates BrightStor ARCServe Backup for Windows 64 bit 9.0.1
Computer Associates BrightStor ARCServe Backup for Windows 11.1
Computer Associates BrightStor ARCServe Backup for Windows 11.0
Computer Associates BrightStor ARCServe Backup for Windows 9.0 .0.1
Computer Associates BrightStor ARCServe Backup for NetWare 11.1
Computer Associates BrightStor ARCServe Backup for NetWare 9.0
Computer Associates BrightStor ARCserve 2000 Backup Windows Japanese
Not Vulnerable:

Discussion

BrightStor ARCserve/Enterprise Backup UDP Probe Remote Buffer Overflow Vulnerability

Various Computer Associates BrightStor ARCserve/Enterprise Backup products are prone to a remote buffer overflow vulnerability. This issue presents itself because the affected applications do not perform boundary checks prior to copying user-supplied data into sensitive process buffers.

A remote attacker may execute arbitrary code on a vulnerable computer to gain unauthorized access to it.

Exploit / POC

BrightStor ARCserve/Enterprise Backup UDP Probe Remote Buffer Overflow Vulnerability

The following exploit has been made available by <[email protected]>.

An exploit for the MetaSploit Framework is available.

Solution / Fix

BrightStor ARCserve/Enterprise Backup UDP Probe Remote Buffer Overflow Vulnerability

Solution:
The vendor has released updates to address this issue.

Computer Associates has made the patch 'QO64496' available for their Microsoft Windows packages. This patch supercedes the patch 'QO62769', which was previously released for this issue and also resolves the issue outlined in BID 12536 (BrightStor ARCserve/Enterprise Discovery Service SERVICEPC Remote Buffer Overflow Vulnerability). Users are advised to apply the new patch as soon as possible; the old patch has been withdrawn.

Fixes QO64496, QO62989, QO62990, and QO62987 superseded by QO64538, QO64712, QO64711, and QO64713.

Fixes QO62767, QO62768, QO62770, QO62771, QO62772, QO62936, and QO62991 superseded by QO64542, QO64539, QO64540, QO64544, QO64541, QO64543, and QO64711.

Users are advised to apply the latest versions of all fixes.


Computer Associates BrightStor ARCserve 2000 Backup Windows Japanese

Computer Associates BrightStor Enterprise Backup 10.0

Computer Associates BrightStor Enterprise Backup 10.5

Computer Associates BrightStor ARCServe Backup for Windows 64 bit 11.0

Computer Associates BrightStor ARCServe Backup for Windows 11.0

Computer Associates BrightStor ARCServe Backup for NetWare 11.1

Computer Associates BrightStor ARCServe Backup for Windows 64 bit 11.1

Computer Associates BrightStor ARCServe Backup for Windows 11.1

Computer Associates BrightStor ARCServe Backup for NetWare 9.0

Computer Associates BrightStor ARCServe Backup for Windows 9.0 .0.1

References

BrightStor ARCserve/Enterprise Backup UDP Probe Remote Buffer Overflow Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report