First published: Thu Feb 10 2005(Updated: )
Stack-based buffer overflow in the Discovery Service for BrightStor ARCserve Backup 11.1 and earlier allows remote attackers to execute arbitrary code via a long packet to UDP port 41524, which is not properly handled in a recvfrom call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom ARCserve Backup | =11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0260 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2005-0260, it is recommended to upgrade to a version of BrightStor ARCserve Backup that is not affected by this vulnerability.
CVE-2005-0260 specifically affects BrightStor ARCserve Backup version 11.1 and earlier.
Yes, CVE-2005-0260 can be exploited remotely by sending a specially crafted packet to UDP port 41524.
CVE-2005-0260 involves a stack-based buffer overflow attack which can lead to arbitrary code execution.