The cadbd RPC service in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to (1) execute arbitrary code via stack-based buffer overflows in unspecified RPC procedures, and (2) trigger memory corruption related to the use of "handle" RPC arguments as pointers.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/41373 - | |
References | () http://osvdb.org/41374 - | |
References | () http://secunia.com/advisories/27192 - | |
References | () http://secunia.com/secunia_research/2007-62/advisory/ - Patch, Vendor Advisory | |
References | () http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp - Patch | |
References | () http://www.securityfocus.com/archive/1/482121/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/26015 - | |
References | () http://www.securitytracker.com/id?1018805 - | |
References | () http://www.vupen.com/english/advisories/2007/3470 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/37070 - |
Information
Published : 2007-10-13 00:17
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5330
Mitre link : CVE-2007-5330
CVE.ORG link : CVE-2007-5330
JSON object : View
Products Affected
broadcom
- brightstor_enterprise_backup
- brightstor_arcserve_backup