CVE-2007-0169

Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Server/Business Protection Suite r2 allow remote attackers to execute arbitrary code via RPC requests with crafted data for opnums (1) 0x2F and (2) 0x75 in the (a) Message Engine RPC service, or opnum (3) 0xCF in the Tape Engine service.
References
Link Resource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=467
http://osvdb.org/31327
http://secunia.com/advisories/23648 Vendor Advisory
http://securitytracker.com/id?1017506
http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp Patch
http://www.kb.cert.org/vuls/id/151032 US Government Resource
http://www.kb.cert.org/vuls/id/180336 US Government Resource
http://www.securityfocus.com/archive/1/456618/100/0/threaded
http://www.securityfocus.com/archive/1/456619/100/0/threaded
http://www.securityfocus.com/archive/1/456711
http://www.securityfocus.com/bid/22005
http://www.securityfocus.com/bid/22006
http://www.vupen.com/english/advisories/2007/0154 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-07-003.html Exploit
http://www.zerodayinitiative.com/advisories/ZDI-07-004.html Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/31433
https://exchange.xforce.ibmcloud.com/vulnerabilities/31443
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=467
http://osvdb.org/31327
http://secunia.com/advisories/23648 Vendor Advisory
http://securitytracker.com/id?1017506
http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp Patch
http://www.kb.cert.org/vuls/id/151032 US Government Resource
http://www.kb.cert.org/vuls/id/180336 US Government Resource
http://www.securityfocus.com/archive/1/456618/100/0/threaded
http://www.securityfocus.com/archive/1/456619/100/0/threaded
http://www.securityfocus.com/archive/1/456711
http://www.securityfocus.com/bid/22005
http://www.securityfocus.com/bid/22006
http://www.vupen.com/english/advisories/2007/0154 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-07-003.html Exploit
http://www.zerodayinitiative.com/advisories/ZDI-07-004.html Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/31433
https://exchange.xforce.ibmcloud.com/vulnerabilities/31443
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:broadcom:brightstor_arcserve_backup:*:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:25

Type Values Removed Values Added
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=467 - () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=467 -
References () http://osvdb.org/31327 - () http://osvdb.org/31327 -
References () http://secunia.com/advisories/23648 - Vendor Advisory () http://secunia.com/advisories/23648 - Vendor Advisory
References () http://securitytracker.com/id?1017506 - () http://securitytracker.com/id?1017506 -
References () http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp - Patch () http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp - Patch
References () http://www.kb.cert.org/vuls/id/151032 - US Government Resource () http://www.kb.cert.org/vuls/id/151032 - US Government Resource
References () http://www.kb.cert.org/vuls/id/180336 - US Government Resource () http://www.kb.cert.org/vuls/id/180336 - US Government Resource
References () http://www.securityfocus.com/archive/1/456618/100/0/threaded - () http://www.securityfocus.com/archive/1/456618/100/0/threaded -
References () http://www.securityfocus.com/archive/1/456619/100/0/threaded - () http://www.securityfocus.com/archive/1/456619/100/0/threaded -
References () http://www.securityfocus.com/archive/1/456711 - () http://www.securityfocus.com/archive/1/456711 -
References () http://www.securityfocus.com/bid/22005 - () http://www.securityfocus.com/bid/22005 -
References () http://www.securityfocus.com/bid/22006 - () http://www.securityfocus.com/bid/22006 -
References () http://www.vupen.com/english/advisories/2007/0154 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/0154 - Vendor Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-07-003.html - Exploit () http://www.zerodayinitiative.com/advisories/ZDI-07-003.html - Exploit
References () http://www.zerodayinitiative.com/advisories/ZDI-07-004.html - Exploit () http://www.zerodayinitiative.com/advisories/ZDI-07-004.html - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/31433 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/31433 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/31443 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/31443 -

Information

Published : 2007-01-11 22:28

Updated : 2024-11-21 00:25


NVD link : CVE-2007-0169

Mitre link : CVE-2007-0169

CVE.ORG link : CVE-2007-0169


JSON object : View

Products Affected

broadcom

  • brightstor_arcserve_backup
  • brightstor_enterprise_backup
  • business_protection_suite
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer