First published: Sat Oct 13 2007(Updated: )
The cadbd RPC service in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to (1) execute arbitrary code via stack-based buffer overflows in unspecified RPC procedures, and (2) trigger memory corruption related to the use of "handle" RPC arguments as pointers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Brightstor Arcserve Backup | =10.5 | |
Broadcom Brightstor Arcserve Backup | =11.5 | |
Broadcom Brightstor Arcserve Backup | =11 | |
Broadcom Brightstor Arcserve Backup | =11.1 | |
Broadcom Brightstor Arcserve Backup | =9.01 | |
Broadcom Brightstor Enterprise Backup | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.