First published: Fri Nov 24 2006(Updated: )
Buffer overflow in the Tape Engine (tapeeng.exe) in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 and earlier allows remote attackers to execute arbitrary code via certain RPC requests to TCP port 6502.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom ARCserve Backup | <=11.5 | |
Broadcom ARCserve Backup | =11.1 | |
Broadcom ARCserve Backup | =11.5-sp1 | |
CA ARCserve Backup for Laptops and Desktops | =11 | |
CA ARCserve Backup for Laptops and Desktops | =11.1 | |
Broadcom BrightStor ARCServe Backup | =11.0 | |
Broadcom BrightStor ARCServe Backup | =11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6076 has a high severity rating due to its potential for remote code execution.
To address CVE-2006-6076, it is recommended to upgrade to a version of CA BrightStor ARCserve Backup later than 11.5.
CVE-2006-6076 affects CA BrightStor ARCserve Backup versions 11.0 to 11.5 before any security updates.
The attack vector for CVE-2006-6076 is via certain RPC requests sent to TCP port 6502.
Yes, CVE-2006-6076 can be exploited remotely by attackers targeting the vulnerable software.