Summary
This host is installed with CA ARCserve Backup and is prone multiple vulnerabilities.
Impact
Successful exploitation will remote attackers to execute arbitrary code or cause a denial of service condition.
Impact Level: System/Application
Solution
Apply the patch from below link,
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={F9EEA31E-8089-423E-B746-41B5C9DD2AC1}
Insight
The flaws are due to an error in the RPC service, which fails to validate user supplied crafted input.
Affected
CA ARCserve Backup for Windows r12.5, r15, r16
References
Severity
Classification
-
CVE CVE-2012-2971, CVE-2012-2972 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apple QuickTime Multiple Denial of Service Vulnerabilities - (Windows)
- CA ARCserve Backup RPC Services Multiple Vulnerabilities (Windows)
- CiscoKits CCNA TFTP Server 'Write' Command Denial Of Service Vulnerability
- Google Chrome Multiple Denial of Service Vulnerabilities - January12 (Windows)
- Asterisk IAX2 Call Number Exhaustion DOS Vulnerability (Linux)