First published: Sun Dec 10 2006(Updated: )
Buffer overflow in the BrightStor Backup Discovery Service in multiple CA products, including ARCserve Backup r11.5 SP1 and earlier, ARCserve Backup 9.01 up to 11.1, Enterprise Backup 10.5, and CA Server Protection Suite r2, allows remote attackers to execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom ARCserve Backup | =11.5-sp1 | |
Broadcom ARCserve Backup | =11.5 | |
Broadcom ARCserve Backup | =11 | |
Broadcom ARCserve Backup | =11.1 | |
Broadcom ARCserve Backup | =9.01 | |
Broadcom BrightStor Enterprise Backup | =10.5 | |
Broadcom Server Protection Suite | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6379 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2006-6379, you should apply the latest patches or updates provided by Broadcom for the affected CA products.
CVE-2006-6379 affects several versions of Broadcom's BrightStor Backup products, including ARCserve Backup, Enterprise Backup, and Server Protection Suite.
Yes, CVE-2006-6379 can be exploited remotely, allowing attackers to execute arbitrary code on vulnerable systems.
Failure to address CVE-2006-6379 can lead to unauthorized access, data breaches, and potentially complete system compromise.