Arcserve Network Error 10053
Contents |
Phone: Company: Customer Type: Select Customer TypeEnd CustomerTrial CustomerResellerDistributerMSP Arcserve Employee e3392 backup server tcp reconnection timeout network error 10060 Language: EnglishFrenchGermanItalianJapanesePolishPortugueseSpanishTurkish Country: Region: North AmericaJapanAsia PacificEMEA (Europe MiddleEast network error 10054 cannot receive data Africa)Latin America Time zone: Select Time Zone GMT-11:00 :: American Samoa GMT-11:00 :: International Date e3392 backup server tcp reconnection timeout arcserve Line West GMT-11:00 :: Midway Island GMT-10:00 :: Hawaii GMT-09:00 :: Alaska GMT-08:00 :: Pacific Time (US & Canada) GMT-08:00 :: Tijuana GMT-07:00
Arcserve E3392
:: Arizona GMT-07:00 :: Chihuahua GMT-07:00 :: Mazatlan GMT-07:00 :: Mountain Time (US & Canada) GMT-06:00 :: Central America GMT-06:00 :: Central Time (US & Canada) GMT-06:00 :: Guadalajara GMT-06:00 :: Mexico City GMT-06:00 :: Monterrey GMT-06:00 :: Saskatchewan GMT-05:00 :: Bogota GMT-05:00 :: Eastern Time (US & arcserve e3392 10060 Canada) GMT-05:00 :: Indiana (East) GMT-05:00 :: Lima GMT-05:00 :: Quito GMT-04:30 :: Caracas GMT-04:00 :: Atlantic Time (Canada) GMT-04:00 :: Georgetown GMT-04:00 :: La Paz GMT-04:00 :: Puerto Rico GMT-03:30 :: Newfoundland GMT-03:00 :: Buenos Aires GMT-03:00 :: Greenland GMT-03:00 :: Santiago GMT-02:00 :: Brasilia GMT-02:00 :: Mid-Atlantic GMT-01:00 :: Azores GMT-01:00 :: Cape Verde Is. GMT+00:00 :: Casablanca GMT+00:00 :: Dublin GMT+00:00 :: Edinburgh GMT+00:00 :: Lisbon GMT+00:00 :: London GMT+00:00 :: Monrovia GMT+00:00 :: UTC GMT+01:00 :: Amsterdam GMT+01:00 :: Belgrade GMT+01:00 :: Berlin GMT+01:00 :: Bern GMT+01:00 :: Bratislava GMT+01:00 :: Brussels GMT+01:00 :: Budapest GMT+01:00 :: Copenhagen GMT+01:00 :: Ljubljana GMT+01:00 :: Madrid GMT+01:00 :: Oslo GMT+01:00 :: Paris GMT+01:00 :: Prague GMT+01:00 :: Rome GMT+01:00 :: Sarajevo GMT+01:00 :: Skopje GMT+01:00 :: Stockholm GMT+01:00 :: Vienna GMT+01:00 :: Warsaw GMT+01:00 :: West Central Africa GMT+01:00
Join INTELLIGENT WORK FORUMSFOR COMPUTER PROFESSIONALS Log In Come Join Us! Are you aComputer / IT professional?Join Tek-Tips Forums! Talk With Other Members Be Notified Of ResponsesTo Your http://www.tek-tips.com/viewthread.cfm?qid=847032 Posts Keyword Search One-Click Access To YourFavorite Forums Automated SignaturesOn Your Posts Best Of All, It's Free! Join Us! *Tek-Tips's functionality depends on members receiving e-mail. By joining you are opting https://tools.cisco.com/security/center/viewAlert.x?alertId=12444 in to receive e-mail. Posting Guidelines Promoting, selling, recruiting, coursework and thesis posting is forbidden.Tek-Tips Posting Policies Jobs Jobs from Indeed What: Where: jobs by Link To This Forum! Add Stickiness network error To Your Site By Linking To This Professionally Managed Technical Forum.Just copy and paste the BBCode HTML Markdown MediaWiki reStructuredText code below into your site. CA: ARCserve back-up Forum at Tek-Tips HomeForumsServer RackBack-up SystemsCA: ARCserve back-up Forum Backup fails - Unable to establish TCP reconnection to agent thread478-847032 Forum Search FAQs Links MVPs Backup fails - Unable to establish TCP reconnection e3392 backup server to agent Backup fails - Unable to establish TCP reconnection to agent MiddleWork (IS/IT--Management) (OP) 24 May 04 11:10 System Details:ARCServe 9 (build 2020) on Windows 2000 SP4 ServerUsing a Plasmon V21 autoloaderOk, when backing up one of our servers I receive the following error...E3394 - Unable to establish TCP reconnection because the agent does not have the requested packet (SEQ=31463, AGENT=IPXXX.XXX.XXX.XX(Servername(IPXXX.XXX.XXX.XX)))This doesn't happen every time however it does fail more offen then not.So far I have reinstalled the agent on the client server and have checked the logs, which show the following errors...[SD]Send Error. RC=18012746, Socket error 10054, buffer size: 131072, position: 832036The above error occurs throughout the log with the buffer size and position displaying a different value each time.Anyone have any suggestions on how to fix this issue?I have been told to set the agent to debug mode (through a registry setting) but im not sure what I need to do after doing so.All help very much appreciated!! RE: Backup fails - Unable to establish TCP reconnection to agent davidmichel (TechnicalUser) 25 May 04 14:15 From the Client Agent Admin set th
Cisco Security Advisories Cisco Intrusion Prevention System Signatures Cisco Applied Mitigation Bulletins Cisco Security Blog Cisco Event Response Pages Cisco IntelliShield Alerts Cisco Security Responses Cisco Cyber Risk Reports Cisco Security White Papers Snort Rules Home / Cisco Security / Security Advisories and Alerts Multivendor Vulnerability Alert CA BrightStor ARCserve Backup Products Message Engine Service Buffer Overflow Vulnerability Critical Alert ID: 12444 FirstPublished: 2007January1216:58GMT LastUpdated: 2007January2921:58GMT Version: 2 CVE-2007-0169 CWE-119 CVSSScore: Base 10.0, Temporal 7.8Click Icon to Copy Verbose Score AV:R/AC:L/Au:NR/C:C/I:C/A:C/B:N/E:P/RL:O/RC:C CVE-2007-0169 CWE-119 Summary CA BrightStor ARCserve Backup and BrightStor Enterprise Backup contain a buffer overflow vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code with elevated privileges. The vulnerability is due to insufficient bounds checking within the Message Engine RPC service when handling RPC requests. An attacker could exploit this vulnerability via malformed RPC requests to trigger a buffer overflow condition. An exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. Proof-of-concept code is available. CA confirmed this vulnerability in a security notice and released updated software. Indicators of Compromise The following products on the Windows platform are vulnerable: BrightStor ARCserve Backup r11.5BrightStor ARCserve Backup r11.1 BrightStor ARCserve Backup for Windows r11 BrightStor Enterprise Backup r10.5 BrightStor ARCserve Backup v9.01 Technical Information The vulnerability is due to a boundary error within ascore.dll used by the message engine process msgeng.exe. Part of the vulnerability resides within the handler for opcode 0x2F, which is used to run the preflight check utility PFC. This utility is used to execute a series of checks on the server to test if any backup jobs might fail. An unauthenticated, remote attacker could exploit this vulnerability by sending RPC requests containing crafted data for opnum 0x2F, which passes a user-supplied buffer to the vsprint() function prior to validating its size. This request triggers an exploitable stack-based buffer overflow condition and can allow the attacker to execute arbitrary code with SYSTEM privileges. A similar condition is exploitable against opnum 0x75. By default, the Message Engine RPC service listens on ports 6503/tcp and 6504/tcp. Analysis The vulnerability exists within the Message Engine Service