[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20070111224827.6C8111B00C@dd4012.kasserver.com>
Date: Thu, 11 Jan 2007 23:48:27 +0100 (CET)
from: advisories@...ec.com
to: full-disclosure@...ts.grok.org.uk
Subject: LS-20061002 - Computer Associates BrightStor
ARCserve Backup Remote Code Execution Vulnerability
LS-20061002
LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup v11.5, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system. The flaw specifically exists within the Tape Engine (tapeeng.exe) due to incorrect handling of RPC requests on TCP port 6502. The interface is identified by
62b93df0-8b02-11ce-876c-00805f842837. Opnum 191 specifies the vulnerable operation within this interface.
Technical details:
http://www.lssec.com/advisories.html
LSsecurity - LSsec.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists