First published: Wed May 21 2008(Updated: )
Directory traversal vulnerability in caloggerd in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allows remote attackers to append arbitrary data to arbitrary files via directory traversal sequences in unspecified input fields, which are used in log messages. NOTE: this can be leveraged for code execution in many installation environments by writing to a startup file or configuration file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA BrightStor ARCServe BackUp | =r11.0 | |
CA BrightStor ARCServe BackUp | =11.0 | |
Ca Business Protection Suite | =2.0 | |
Ca Business Protection Suite | =2.0 | |
Broadcom Brightstor Arcserve Backup | =11.5 | |
Broadcom Brightstor Arcserve Backup | =11.1 | |
Broadcom Server Protection Suite | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.