Vulnerability Details : CVE-2008-4397
Public exploit exists!
Directory traversal vulnerability in the RPC interface (asdbapi.dll) in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to execute arbitrary commands via a .. (dot dot) in an RPC call with opnum 0x10A.
Vulnerability category: Directory traversalInput validation
Products affected by CVE-2008-4397
- cpe:2.3:a:ca:arcserve_backup:r11.1:*:*:*:*:*:*:*
- cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*
- cpe:2.3:a:ca:business_protection_suite:r2:*:microsoft_small_business_server_premium:*:*:*:*:*
- cpe:2.3:a:ca:business_protection_suite:r2:*:microsoft_small_business_server_standard:*:*:*:*:*
- cpe:2.3:a:broadcom:arcserve_backup:r12.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:business_protection_suite:r2:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:server_protection_suite:r2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-4397
91.88%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2008-4397
-
Computer Associates ARCserve REPORTREMOTEEXECUTECML Buffer Overflow
Disclosure Date: 2008-10-09First seen: 2020-04-26exploit/windows/brightstor/ca_arcserve_342This module exploits a buffer overflow in Computer Associates BrightStor ARCserve r11.5 (build 3884). By sending a specially crafted RPC request to opcode 0x342, an attacker could overflow the buffer and execute arbitrary code. In order to successfully exploit this vulnera
CVSS scores for CVE-2008-4397
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2008-4397
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-4397
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/45774
-
http://www.vupen.com/english/advisories/2008/2777
-
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143
Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/497218
-
http://www.securityfocus.com/bid/31684
Computer Associates ARCserve Backup Multiple Remote Vulnerabilities
-
http://www.securitytracker.com/id?1021032
-
http://securityreason.com/securityalert/4412
-
http://www.securityfocus.com/archive/1/497281/100/0/threaded
Jump to