First published: Tue Oct 14 2008(Updated: )
Directory traversal vulnerability in the RPC interface (asdbapi.dll) in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to execute arbitrary commands via a .. (dot dot) in an RPC call with opnum 0x10A.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Business Protection Suite | =r2 | |
CA ARCserve Backup for Laptops and Desktops | =r11.1 | |
Broadcom Business Protection Suite | =r2 | |
CA ARCserve Backup for Laptops and Desktops | =r11.5 | |
Broadcom BrightStor ARCserve Backup | =r12.0 | |
Broadcom Business Protection Suite | =r2 | |
Broadcom Server Protection Suite | =r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4397 is considered a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2008-4397, it is recommended to apply the latest patches provided by CA for the affected versions of ARCserve Backup.
CVE-2008-4397 affects CA ARCserve Backup versions r11.1 through r12.0, along with specific editions of the Business Protection Suite.
Yes, CVE-2008-4397 can be exploited remotely by attackers utilizing a malicious RPC call with directory traversal techniques.
CVE-2008-4397 allows attackers to execute arbitrary commands on the affected systems, leading to potential unauthorized access or data loss.