CA BrightStor ARCServe Backup Discovery服务邮槽远程溢出漏洞

漏洞信息详情

CA BrightStor ARCServe Backup Discovery服务邮槽远程溢出漏洞

漏洞简介

BrightStor ARCserve Backup可为各种平台的服务器提供备份和恢复保护功能。

BrightStor ARCserve Backup的Discovery服务(casdscsvc.exe)在处理TCP/41523端口上所接收到的请求时存在栈溢出漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。

当该服务在处理通过名为CheyenneDS的邮槽所接收到的超长消息时,由于在调用CreateMailslot过程中没有提供明确的MaxMessageSize,攻击者可以触发可利用的栈溢出。

创建邮槽过程如下:

casdscsvc.exe -> Asbrdcst.dll

20C14E8C push 0 ; lpSecurityAttributes

20C14E8E push 0 ; lReadTimeout

20C14E90 push 0 ; nMaxMessageSize

20C14E92 push offset Name ; \”\\.\mailslot\CheyenneDS\”

20C14E97 stosb

20C14E98 call ds:CreateMailslotA

20C14E9E cmp eax, INVALID_HANDLE_VALUE

20C14EA1 mov mailslot_handle, eax

请注意没有指定明确的MaxMessageSize。之后从4k的缓冲区读取了邮槽句柄,并且将所读取的数据传送给了使用1k大小缓冲区的vsprintf调用。

casdscsvc.exe -> Asbrdcst.dll

20C15024 mov eax, mailslot_handle

20C15029 lea edx, [esp+1044h+Buffer_4k]

20C1502D push ecx ; nNumberOfBytesToRead

20C1502E push edx ; lpBuffer

20C1502F push eax ; hFile

20C15030 call edi ; ReadFile

20C15032 test eax, eax

20C15034 jz short read_failed

20C15036 lea ecx, [esp+3Dh]

20C1503A push ecx ; char

20C1503B push offset str_ReadmailslotS ; \”ReadMailSlot: \\%s
\”

20C15040 call not_interesting_call_to_vsnprtinf

20C15045 add esp, 8

20C15048 lea edx, [esp+3Dh]

20C1504C push edx ; va_list

20C1504D push offset str_ReadmailslotS_0 ; \”ReadMailSlot: \\%s\”

20C15052 push 0 ; for_debug_log

20C15054 call vsprintf_into_1024_stack_buf_and_debug_log

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://supportconnect.ca.com/

参考网址

来源:XF

链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/29365

来源:CONFIRM

链接:http://www3.ca.com/securityadvisor/blogs/posting.aspx?pid=93775&id=90744

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/447853/100/100/threaded

来源:MISC

链接:http://www.tippingpoint.com/security/advisories/TSRT-06-12.html

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/447839/100/100/threaded

来源:BID

链接:https://www.securityfocus.com/bid/20364

来源:CONFIRM

链接:http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34694

来源:SECUNIA

链接:http://secunia.com/advisories/22283

来源:CONFIRM

链接:http://www3.ca.com/securityadvisor/blogs/posting.aspx?pid=94397&id=90744

来源:CONFIRM

链接:http://supportconnectw.ca.com/public/storage/infodocs/basbr-secnotice.asp

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2006/3930

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享