CVE-2009-1761

The message engine in CA ARCserve Backup r12.0 and r12.0 SP1 for Windows allows remote attackers to cause a denial of service (crash) via (1) an invalid 0x13 message, which is not properly handled in the ASCORE module, or (2) a 0x3B message with invalid stub data that triggers an RPC marshalling error.
References
Link Resource
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-01-ca-arcserve-backup-message-engine-denial-of-service-vulnerabilities.aspx Patch
http://secunia.com/advisories/35473 Vendor Advisory
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209502 Patch Vendor Advisory
http://www.ivizsecurity.com/security-advisory-iviz-sr-09003.html Exploit
http://www.ivizsecurity.com/security-advisory-iviz-sr-09004.html Exploit
http://www.securityfocus.com/archive/1/504348/100/0/threaded
http://www.securityfocus.com/archive/1/504349/100/0/threaded
http://www.securityfocus.com/bid/35396
http://www.securitytracker.com/id?1022405
http://www.vupen.com/english/advisories/2009/1608
https://exchange.xforce.ibmcloud.com/vulnerabilities/51169
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-01-ca-arcserve-backup-message-engine-denial-of-service-vulnerabilities.aspx Patch
http://secunia.com/advisories/35473 Vendor Advisory
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209502 Patch Vendor Advisory
http://www.ivizsecurity.com/security-advisory-iviz-sr-09003.html Exploit
http://www.ivizsecurity.com/security-advisory-iviz-sr-09004.html Exploit
http://www.securityfocus.com/archive/1/504348/100/0/threaded
http://www.securityfocus.com/archive/1/504349/100/0/threaded
http://www.securityfocus.com/bid/35396
http://www.securitytracker.com/id?1022405
http://www.vupen.com/english/advisories/2009/1608
https://exchange.xforce.ibmcloud.com/vulnerabilities/51169
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ca:arcserve_backup:r12.0:*:windows:*:*:*:*:*
cpe:2.3:a:ca:arcserve_backup:r12.0:sp1:windows:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-01-ca-arcserve-backup-message-engine-denial-of-service-vulnerabilities.aspx - Patch () http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-01-ca-arcserve-backup-message-engine-denial-of-service-vulnerabilities.aspx - Patch
References () http://secunia.com/advisories/35473 - Vendor Advisory () http://secunia.com/advisories/35473 - Vendor Advisory
References () http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209502 - Patch, Vendor Advisory () http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209502 - Patch, Vendor Advisory
References () http://www.ivizsecurity.com/security-advisory-iviz-sr-09003.html - Exploit () http://www.ivizsecurity.com/security-advisory-iviz-sr-09003.html - Exploit
References () http://www.ivizsecurity.com/security-advisory-iviz-sr-09004.html - Exploit () http://www.ivizsecurity.com/security-advisory-iviz-sr-09004.html - Exploit
References () http://www.securityfocus.com/archive/1/504348/100/0/threaded - () http://www.securityfocus.com/archive/1/504348/100/0/threaded -
References () http://www.securityfocus.com/archive/1/504349/100/0/threaded - () http://www.securityfocus.com/archive/1/504349/100/0/threaded -
References () http://www.securityfocus.com/bid/35396 - () http://www.securityfocus.com/bid/35396 -
References () http://www.securitytracker.com/id?1022405 - () http://www.securitytracker.com/id?1022405 -
References () http://www.vupen.com/english/advisories/2009/1608 - () http://www.vupen.com/english/advisories/2009/1608 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/51169 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/51169 -

Information

Published : 2009-06-16 23:30

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1761

Mitre link : CVE-2009-1761

CVE.ORG link : CVE-2009-1761


JSON object : View

Products Affected

ca

  • arcserve_backup
CWE
CWE-20

Improper Input Validation