7.1
CVSSv2

CVE-2007-1785

Published: 31/03/2007 Updated: 07/04/2021
CVSS v2 Base Score: 7.1 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 715
Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C

Vulnerability Summary

The RPC service in mediasvr.exe in CA BrightStor ARCserve Backup 11.5 SP2 build 4237 allows remote malicious users to execute arbitrary code via crafted xdr_handle_t data in RPC packets, which is used in calculating an address for a function call, as demonstrated using the 191 (0xbf) RPC request.

Vulnerable Product Search on Vulmon Subscribe to Product

ca brightstor arcserve backup 11

broadcom brightstor arcserve backup 9.01

broadcom brightstor arcserve backup 11.5

broadcom brightstor arcserve backup 11.1

Exploits

#!/usr/bin/python # # Computer Associates (CA) Brightstor Backup Mediasvrexe Remote Code Exploit # (Previously Unknown) # # There seems to be an design error in the handling of RPC data with xdr procedures # across several dll's imported by Mediasvrexe Four bytes from an RPC packet are # processed as a particular address (xdr_handle_t data whic ...

Github Repositories

Exploit code

Exploits and Shellcode Exploit code by year/CVE 2006/CVE-2006-4868/vmlDoShtml 2007/CVE-2007-0816/catirpcdosrb 2007/CVE-2007-1785/camediasvrremotepy 2007/CVE-2007-2772/caloggerdospy 2007/CVE-2007-2772/camediasvrdospy Shellcode (by OS)