First published: Sat Oct 13 2007(Updated: )
The cadbd RPC service in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to (1) execute arbitrary code via stack-based buffer overflows in unspecified RPC procedures, and (2) trigger memory corruption related to the use of "handle" RPC arguments as pointers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA BrightStor ARCserve Backup | =9.01 | |
CA BrightStor ARCserve Backup | =10.5 | |
CA BrightStor ARCserve Backup | =11 | |
CA BrightStor ARCserve Backup | =11.1 | |
CA BrightStor ARCserve Backup | =11.5 | |
Broadcom BrightStor Enterprise Backup | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5330 is considered high severity due to the potential for remote code execution and memory corruption.
To fix CVE-2007-5330, update your CA BrightStor ARCServe Backup or Enterprise Backup software to the latest version provided by Broadcom.
CVE-2007-5330 affects CA BrightStor ARCServe Backup versions 9.01 through 11.5 and Enterprise Backup version 10.5.
The implications of CVE-2007-5330 include the ability for remote attackers to execute arbitrary commands and cause memory corruption.
While the primary solution is to patch the software, restricting access to the cadbd RPC service can serve as a temporary workaround.