First published: Wed Jul 18 2007(Updated: )
Multiple stack-based buffer overflows in the RPC implementation in alert.exe before 8.0.255.0 in CA (formerly Computer Associates) Alert Notification Server, as used in Threat Manager for the Enterprise, Protection Suites, certain BrightStor ARCserve products, and BrightStor Enterprise Backup, allow remote attackers to execute arbitrary code by sending certain data to unspecified RPC procedures.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom CA Threat Manager | =8 | |
CA Protection Suites | =r3 | |
CA BrightStor ARCserve Backup | ||
Broadcom BrightStor ARCserve Backup | =11 | |
Broadcom Anti-Virus for the Enterprise | =8 | |
Broadcom Alert Notification Server | ||
CA BrightStor ARCserve Backup | =11.5 | |
CA BrightStor ARCserve Backup | =11.1 | |
CA BrightStor ARCserve Backup | =9.01 | |
Broadcom BrightStor Enterprise Backup | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3825 is rated as high severity due to the potential for remote code execution through stack-based buffer overflows.
To fix CVE-2007-3825, update to version 8.0.255.0 or later of the affected CA products.
CVE-2007-3825 affects CA Alert Notification Server and several BrightStor ARCserve and Enterprise Backup products.
CVE-2007-3825 is a vulnerability that involves multiple stack-based buffer overflows in the RPC implementation.
Yes, CVE-2007-3825 can be exploited remotely, allowing attackers to execute arbitrary code on vulnerable systems.