CA Business Protection Suite up to R2 RPC Interface asdbapi.dll path traversal
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.4 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in CA Business Protection Suite up to R2 and classified as problematic. This affects an unknown function in the library asdbapi.dll of the component RPC Interface. Performing a manipulation results in path traversal. This vulnerability is identified as CVE-2008-4397. There is not any exploit available. The affected component should be upgraded.
Details
A vulnerability, which was classified as critical, was found in CA Business Protection Suite up to R2. This affects an unknown part in the library asdbapi.dll of the component RPC Interface. The manipulation with an unknown input leads to a path traversal vulnerability. CWE is classifying the issue as CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Directory traversal vulnerability in the RPC interface (asdbapi.dll) in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to execute arbitrary commands via a .. (dot dot) in an RPC call with opnum 0x10A.
The bug was discovered 10/09/2008. The weakness was released 10/14/2008 by eEye Digital Security with eEye Digital Security (Website). The advisory is shared at support.ca.com. This vulnerability is uniquely identified as CVE-2008-4397 since 10/02/2008. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details are known, but no exploit is available. MITRE ATT&CK project uses the attack technique T1006 for this issue.
It is declared as highly functional. The vulnerability was handled as a non-public zero-day exploit for at least 5 days. During that time the estimated underground price was around $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 34393 (CA BrightStor ARCserve Backup RPC Interface (asdbapi.dll) Traversal Arbitrary Command Execution), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows and running in the context r.
Upgrading eliminates this vulnerability. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 6526.
The vulnerability is also documented in the databases at X-Force (45774), Tenable (34393), SecurityFocus (BID 31684†), OSVDB (49468†) and Secunia (SA32220†). Entries connected to this vulnerability are available at VDB-44484, VDB-44483 and VDB-44482. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.ca.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.4
VulDB Base Score: 9.8
VulDB Temp Score: 9.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Path traversalCWE: CWE-22
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Highly functional
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 34393
Nessus Name: CA BrightStor ARCserve Backup RPC Interface (asdbapi.dll) Traversal Arbitrary Command Execution
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
MetaSploit ID: ca_arcserve_342.rb
MetaSploit Name: Computer Associates ARCserve REPORTREMOTEEXECUTECML Buffer Overflow
MetaSploit File: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
TippingPoint: 🔍
McAfee IPS: 🔍
McAfee IPS Version: 🔍
PaloAlto IPS: 🔍
Fortigate IPS: 🔍
Timeline
10/02/2008 🔍10/09/2008 🔍
10/09/2008 🔍
10/09/2008 🔍
10/10/2008 🔍
10/10/2008 🔍
10/14/2008 🔍
10/14/2008 🔍
10/14/2008 🔍
10/19/2008 🔍
03/17/2015 🔍
08/18/2019 🔍
Sources
Vendor: ca.comAdvisory: support.ca.com
Researcher: eEye Digital Security
Organization: eEye Digital Security
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2008-4397 (🔍)
GCVE (CVE): GCVE-0-2008-4397
GCVE (VulDB): GCVE-100-44481
IAVM: 🔍
X-Force: 45774
SecurityFocus: 31684 - Computer Associates ARCserve Backup Multiple Remote Vulnerabilities
Secunia: 32220
OSVDB: 49468 - CA ARCserve Backup message engine command execution
SecurityTracker: 1021032
Vulnerability Center: 19748 - CA ARCserve Backup r11.1 - r12.0 RPC Interface Remote Directory Traversal Vulnerability, Critical
Vupen: ADV-2008-2777
See also: 🔍
Entry
Created: 03/17/2015 16:11Updated: 08/18/2019 18:49
Changes: 03/17/2015 16:11 (88), 08/18/2019 18:49 (4)
Complete: 🔍
Cache ID: 216:1AB:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.