First published: Mon Aug 15 2011(Updated: )
BaseServiceImpl.class in CA ARCserve D2D r15 does not properly handle sessions, which allows remote attackers to obtain credentials, and consequently execute arbitrary commands, via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA ARCserve D2D | =r15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3011 is rated as a high severity vulnerability due to its potential for unauthorized access to credentials.
To fix CVE-2011-3011, ensure that you apply the latest security patches and updates provided by CA for the ARCserve D2D r15 software.
CVE-2011-3011 affects the CA ARCserve D2D software specifically version r15.
CVE-2011-3011 allows remote attackers to execute arbitrary commands by leveraging improperly handled sessions.
Currently, the best practice for CVE-2011-3011 is to implement security updates rather than relying on workarounds.