First published: Wed May 21 2008(Updated: )
Directory traversal vulnerability in caloggerd in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allows remote attackers to append arbitrary data to arbitrary files via directory traversal sequences in unspecified input fields, which are used in log messages. NOTE: this can be leveraged for code execution in many installation environments by writing to a startup file or configuration file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom ARCserve Backup | =11.1 | |
Broadcom ARCserve Backup | =11.5 | |
Broadcom Server Protection Suite | =2 | |
CA ARCserve Backup for Laptops and Desktops | =11.0 | |
CA ARCserve Backup for Laptops and Desktops | =r11.0 | |
Broadcom Business Protection Suite | =2.0 | |
Broadcom Business Protection Suite | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2241 is classified as a high severity vulnerability due to the potential for remote attackers to exploit it.
CVE-2008-2241 is a directory traversal vulnerability that allows an attacker to append arbitrary data to files through manipulated input fields.
CVE-2008-2241 affects CA BrightStor ARCServe Backup versions 11.0, 11.1, and 11.5.
To fix CVE-2008-2241, users should update to a patched version of the affected software from CA.
The potential impacts of CVE-2008-2241 include unauthorized data modification and possible execution of arbitrary code.