Skip to main content

Hitachi
Contact UsContact Us

Update: May 16, 2011

On December 15, 2010, CA Technical Support released "CA20101209-01 : CA ARCserve Replication security announcement" (in Japanese) concerning a vulnerability in CA ARCserve Replication r15 and r12.5.
An attack by a malicious remote user can exploit this vulnerability to acquire potentially sensitive information and to execute arbitrary code.

Vulnerability ID

HS11-004

Vulnerability description

The following vulnerability was found in CA ARCserve Replication r15 and r12.5:

  • Malicious remote users can acquire potentially sensitive information from servers on which CA ARCserve Replication products are installed.
  • Malicious remote users can execute arbitrary code on servers on which CA ARCserve Replication products are installed.

Affected products and versions are listed below. Please visit the CA Web site (in Japanese) below, and then apply the patched modules:
http://www.casupport.jp/resources/info/CA20101209-01.htm

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

- CA ARCserve Replication r15 series

Product name: CA ARCserve Replication r15 for Windows Standard OS for File Server

Version(s):

Windows
15-00

- CA ARCserve Replication r12.5 series

Product name: CA ARCserve Replication r12.5 for Windows Standard OS for File Server

Version(s):

Windows
12-50

Countermeasures

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Fixed module:

Platform
Gives the fixed version, and release date.

Scheduled version(s):

  • Fixed module information

Product name: CA ARCserve Replication r15 series

Fixed module(*1)(*2):

  • Apply r15 SP2 (*3).
  • Apply r15 SP1 (*3) before applying RO24455.

Product name: CA ARCserve Replication r12.5 series

Fixed module(*1)(*2):

  • Apply r12.5 SP2 (*4), RO14207 (SP2 Rollup) (*4), and RO17180 (*5) before applying RO24313.
*1
These fixed modules are provided on the CA website (in Japanese).
*2
Before applying the fixed module, prerequisite patches must be applied.
*3
For details about upgrading to r15 SP2 and r15 SP1, see "CA ARCserve Replication r15 for Windows - Download information" (in Japanese).
*4
For details about upgrading to r12.5 SP2 and RO14207, see "CA ARCserve Replication r12.5 for Windows - Download information" (in Japanese).
*5
For details about upgrading to RO17180, see "CA20100406-01 : CA ARCserve Replication security announcement" (in Japanese).

Revision history

May 16, 2011
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.