First published: Sat Oct 13 2007(Updated: )
Stack-based buffer overflow in the RPC interface for the Message Engine (mediasvr.exe) in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to execute arbitrary code via a long argument in the 0x10d opnum.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA BrightStor ARCserve Backup | =9.01 | |
CA BrightStor ARCserve Backup | =10.5 | |
CA BrightStor ARCserve Backup | =11 | |
CA BrightStor ARCserve Backup | =11.1 | |
CA BrightStor ARCserve Backup | =11.5 | |
Broadcom BrightStor Enterprise Backup | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5327 is considered critical due to its potential for remote code execution.
To fix CVE-2007-5327, apply the latest security patches provided by Broadcom for BrightStor ARCServe Backup and Enterprise Backup.
CVE-2007-5327 affects various versions of Broadcom's BrightStor ARCServe Backup and Enterprise Backup software.
Yes, CVE-2007-5327 can be exploited remotely by attackers sending specially crafted requests to the vulnerable software.
Exploiting CVE-2007-5327 can result in arbitrary code execution, potentially allowing an attacker to take control of the affected system.