First published: Wed Jun 06 2007(Updated: )
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a long filename in a .CAB file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA ARCserve Backup for Laptops and Desktops | =11 | |
Broadcom Anti-Virus for the Enterprise | =8 | |
Broadcom Anti-Virus for the Enterprise | =8 | |
Broadcom ARCserve Backup | =11.5 | |
Broadcom ARCserve Backup | =11.1 | |
Broadcom ARCserve Backup | =9.01 | |
Broadcom BrightStor Enterprise Backup | =10.5 | |
broadcom common services | =1.0 | |
broadcom common services | =1.1 | |
broadcom common services | =2.0 | |
broadcom common services | =2.1 | |
broadcom common services | =2.2 | |
broadcom common services | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2863 is classified as a critical severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2007-2863, upgrade your anti-virus software to the latest version available after content update 30.6.
CVE-2007-2863 affects multiple CA products, including CA Anti-Virus for the Enterprise, BrightStor ARCServe Backup, and Broadcom Common Services.
CVE-2007-2863 can be exploited by attackers sending malicious .CAB files with long filenames to execute arbitrary code remotely.
While CVE-2007-2863 was identified years ago, outdated software still in use may remain vulnerable if not patched.