First published: Thu Jan 11 2007(Updated: )
Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Server/Business Protection Suite r2 allow remote attackers to execute arbitrary code via RPC requests with crafted data for opnums (1) 0x2F and (2) 0x75 in the (a) Message Engine RPC service, or opnum (3) 0xCF in the Tape Engine service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom ARCserve Backup | <=11.5 | |
Broadcom ARCserve Backup | =9.01 | |
Broadcom BrightStor Enterprise Backup | =10.5 | |
Broadcom Business Protection Suite | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0169 is considered to have a high severity due to its potential to allow remote code execution.
To mitigate CVE-2007-0169, update to the latest version of the affected software, specifically versions beyond 11.5 for BrightStor ARCserve Backup.
CVE-2007-0169 impacts BrightStor ARCserve Backup versions 9.01 to 11.5, Enterprise Backup 10.5, and Business Protection Suite r2.
CVE-2007-0169 is a buffer overflow vulnerability that can be exploited through specially crafted RPC requests.
CVE-2007-0169 can be exploited by remote attackers targeting systems running the affected versions of the software.