First published: Sat Oct 13 2007(Updated: )
Queue.dll for the message queuing service (LQserver.exe) in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to execute arbitrary code via a malformed ONRPC protocol request for operation 0x76, which causes ARCserve Backup to dereference arbitrary pointers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA ARCserve Backup for Laptops and Desktops | =11 | |
Broadcom Business Protection Suite | =2.0 | |
Broadcom Business Protection Suite | =2.0 | |
Broadcom ARCserve Backup | =11.5 | |
Broadcom ARCserve Backup | =11.1 | |
Broadcom ARCserve Backup | =9.01 | |
Broadcom BrightStor Enterprise Backup | =10.5 | |
Broadcom Business Protection Suite | =2.0 | |
Broadcom Server Protection Suite | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5331 is rated as critical due to its ability to allow remote attackers to execute arbitrary code.
To fix CVE-2007-5331, apply the latest patches from Broadcom for the affected versions of BrightStor and Business Protection Suite.
CVE-2007-5331 affects CA BrightStor ARCServe Backup versions 9.01 to 11.5 and CA Enterprise Backup version 10.5.
Yes, CVE-2007-5331 can be exploited remotely via a malformed ONRPC protocol request.
There are no official workarounds for CVE-2007-5331, so immediate patching is recommended.