First published: Sat Oct 13 2007(Updated: )
Multiple buffer overflows in (1) RPC and (2) rpcx.dll in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allow remote attackers to execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom BrightStor ARCserve Backup | =11 | |
Broadcom Business Protection Suite | =2.0 | |
Broadcom Business Protection Suite | =2.0 | |
CA BrightStor ARCserve Backup | =11.5 | |
CA BrightStor ARCserve Backup | =11.1 | |
CA BrightStor ARCserve Backup | =9.01 | |
Broadcom BrightStor Enterprise Backup | =10.5 | |
Broadcom Business Protection Suite | =2.0 | |
Broadcom Server Protection Suite | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5326 is considered to have a high severity due to the potential for remote code execution.
To mitigate the risk of CVE-2007-5326, users should upgrade to a patched version of CA BrightStor ARCServe Backup or Enterprise Backup.
CVE-2007-5326 affects CA BrightStor ARCServe BackUp versions 9.01 through 11.5, and Enterprise Backup version 10.5.
Remote attackers can exploit CVE-2007-5326 through unspecified vectors that trigger the buffer overflow.
Exploitation of CVE-2007-5326 can lead to arbitrary code execution on the affected systems.