[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4757AAF4.50008@gmail.com>
Date: Thu, 06 Dec 2007 15:55:32 +0800
From: Code Audit Labs <vulnhunt@...il.com>
To: full-disclosure@...ts.grok.org.uk
Cc: bugtraq@...urityfocus.com
Subject: Re: [UPDATE]CA BrightStor ARCServe BackUp Message
Engine Remote Stack Overflow Vulnerability
About half year ago , We decided to NOT audit CA BrightStor ARCServe
Backup any longer, Just because the produce have too many vulnerability
that's not hard to be discovered.
I think CA had better to full code audit for their produces .
cocoruder 写道:
> [UPDATE]CA BrightStor ARCServe BackUp Message Engine Remote Stack
> Overflow Vulnerability
>
> by cocoruder(frankruder_at_hotmail.com)
> http://ruder.cdut.net, updated on 2007.12.06
>
>
> Summary:
>
> A remote stack overflow vulnerability exist in the RPC interface
> of CA BrightStor ARCServe BackUp. An arbitrary anonymous attacker can
> execute arbitrary code on the affected system by exploiting this
> vulnerability.
>
--
Code Audit Labs
http://www.vulnhunt.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists