Directory traversal vulnerability in the RPC interface (asdbapi.dll) in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to execute arbitrary commands via a .. (dot dot) in an RPC call with opnum 0x10A.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/31684 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45774 | vdb entry |
http://www.vupen.com/english/advisories/2008/2777 | vdb entry |
http://www.securitytracker.com/id?1021032 | vdb entry |
http://www.securityfocus.com/archive/1/497281/100/0/threaded | mailing list |
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143 | patch vendor advisory |
http://secunia.com/advisories/32220 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/497218 | mailing list |
http://securityreason.com/securityalert/4412 | third party advisory |