First published: Sat Oct 13 2007(Updated: )
The Message Engine RPC service in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows attackers to execute arbitrary code by using certain "insecure method calls" to modify the file system and registry, aka "Privileged function exposure."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom ARCserve Backup | =9.01 | |
Broadcom ARCserve Backup | =10.5 | |
Broadcom ARCserve Backup | =11 | |
Broadcom ARCserve Backup | =11.1 | |
Broadcom ARCserve Backup | =11.5 | |
Broadcom BrightStor Enterprise Backup | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5328 is considered to have a high severity due to the potential for arbitrary code execution.
To fix CVE-2007-5328, update to a non-vulnerable version of CA BrightStor ARCServe or Enterprise Backup.
CVE-2007-5328 affects CA BrightStor ARCServe Backup versions 9.01 through 11.5 and CA BrightStor Enterprise Backup version 10.5.
CVE-2007-5328 is a vulnerability that allows attackers to execute arbitrary code through insecure method calls.
There are no documented workarounds for CVE-2007-5328; the best action is to apply the necessary updates.