Skip to main content

Hitachi
Contact UsContact Us

Update: May 24, 2007

On January 11, 2007, CA announced on their Important Security Notice for CA ARCserve Backup (Display new window) that BrightStor ARCserve Backup r11.5, BrightStor ARCserve Backup r11.1, BrightStor ARCserve Backup Release 11, and BrightStor ARCserve Backup v9 have a vulnerability concerning buffer overflow. Malicious remote attackers can exploit this vulnerability and execute arbitrary code.

Vulnerability ID

HS07-005

Vulnerability description

The following vulnerability was found in BrightStor ARCserve Backup r11.5, BrightStor ARCserve Backup r11.1, BrightStor ARCserve Backup Release 11, and BrightStor ARCserve Backup v9:

  • Malicious remote attackers can exploit the buffer overflow vulnerability and execute arbitrary code on backup servers that have BrightStor ARCserve Backup products installed.

This vulnerability affects the CA BrightStor Tape Engine. Affected products and versions are listed below. Please visit the Broadcom website below and apply the corrective patches.
https://support.broadcom.com/external/content/security-advisories/Important-Security-Notice-for-CA-ARCserve-Backup/1871 (Display new window)

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

- BrightStor ARCserve Backup r11.5 series

Product name: BrightStor ARCserve Backup r11.5 for Windows
Product name: BrightStor ARCserve Backup r11.5 for Windows Microsoft SQL Suite
Product name: BrightStor ARCserve Backup r11.5 for Windows Microsoft Exchange Suite
Product name: BrightStor ARCserve Backup r11.5 for Windows SAN Secondary Server Bundle

Version(s):

Windows
11-50, 11-51

- BrightStor ARCserve Backup r11.1 series

Product name: BrightStor ARCserve Backup r11.1 for Windows
Product name: BrightStor ARCserve Backup r11.1 for Windows Microsoft SQL Suite
Product name: BrightStor ARCserve Backup r11.1 for Windows Microsoft Exchange Suite
Product name: BrightStor ARCserve Backup r11.1 for Windows SAN Secondary Server Bundle

Version(s):

Windows
11-10

- BrightStor ARCserve Backup Release 11 series

Product name: BrightStor ARCserve Backup Release 11 for Windows
Product name: BrightStor ARCserve Backup Release 11 for Windows Microsoft SQL Suite
Product name: BrightStor ARCserve Backup Release 11 for Windows Microsoft Exchange Suite

Version(s):

Windows
11-00

- BrightStor ARCserve Backup v9 series

Product name: BrightStor ARCserve Backup v9 for Windows Japanese

Version(s):

Windows
09-00

Countermeasures

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Fixed module:

Platform
Gives the fixed version, and release date.

Scheduled version:

  • Fixed module information

Product name: BrightStor ARCserve Backup r11.5 series

Fixed module(*1)(*2):

  • upgrade to r11.5 SP3(*3), or apply QO84983(BAB115WFix.exe)

Product name: BrightStor ARCserve Backup r11.1 series

Fixed module(*1)(*2):

  • apply QO84984(BAB111WFix.exe)

Product name: BrightStor ARCserve Backup Release 11 series

Fixed module(*1)(*2):

  • upgrade to r11.1(*4), and apply QO84984(BAB111WFix.exe)

Product name: BrightStor ARCserve Backup v9 series

Fixed module(*1)(*2):

  • apply QO84985(BAB901wFix.exe)
*1
These fixed modules are provided on the CA website (in Japanese).
*2
Before applying the fixed module, other fixed modules provided on the CA Technical Support page must be applied.
*3
For details about upgrading from r11.5, r11.5 SP1, or r11.5 SP2 to r11.5 SP3, please refer to the CA Technical Support page.
*4
For details about upgrading from Release 11 to r11.1, please refer to the CA Technical Support page.

Revision history

May 24, 2007
Information about countermeasures is updated.
February 23, 2007
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.