First published: Wed Apr 25 2007(Updated: )
Multiple stack-based buffer overflows in the SUN RPC service in CA (formerly Computer Associates) BrightStor ARCserve Media Server, as used in BrightStor ARCserve Backup 9.01 through 11.5 SP2, BrightStor Enterprise Backup 10.5, Server Protection Suite 2, and Business Protection Suite 2, allow remote attackers to execute arbitrary code via malformed RPC strings, a different vulnerability than CVE-2006-5171, CVE-2006-5172, and CVE-2007-1785.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Business Protection Suite | =2.0 | |
Broadcom Business Protection Suite | =2.0 | |
CA ARCserve Backup for Laptops and Desktops | =11 | |
Broadcom ARCserve Backup | =11.5-sp2 | |
Broadcom ARCserve Backup | =11.1 | |
Broadcom ARCserve Backup | =9.01 | |
Broadcom Business Protection Suite | =2.0 | |
Broadcom Server Protection Suite | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2139 has been rated as high severity due to its nature of allowing remote attackers to execute arbitrary code.
To fix CVE-2007-2139, update the affected CA BrightStor ARCserve Media Server to a version that has addressed this vulnerability.
CVE-2007-2139 affects multiple versions of CA BrightStor ARCserve Backup, Server Protection Suite, and Business Protection Suite.
Yes, CVE-2007-2139 can be exploited remotely due to stack-based buffer overflows in the SUN RPC service.
The potential impacts of CVE-2007-2139 include unauthorized access and control over the affected systems, leading to data breaches.