CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
97.1%
Directory traversal vulnerability in caloggerd in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allows remote attackers to append arbitrary data to arbitrary files via directory traversal sequences in unspecified input fields, which are used in log messages. NOTE: this can be leveraged for code execution in many installation environments by writing to a startup file or configuration file.
Vendor | Product | Version | CPE |
---|---|---|---|
broadcom | brightstor_arcserve_backup | 11.1 | cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:* |
broadcom | brightstor_arcserve_backup | 11.5 | cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:* |
broadcom | server_protection_suite | 2 | cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:* |
ca | brightstor_arcserve_backup | 11.0 | cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:*:*:*:*:*:* |
ca | brightstor_arcserve_backup | r11.0 | cpe:2.3:a:ca:brightstor_arcserve_backup:r11.0:*:*:*:*:*:*:* |
ca | business_protection_suite | 2.0 | cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_small_business_server_premium:*:*:*:*:* |
ca | business_protection_suite | 2.0 | cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_small_business_server_standard:*:*:*:*:* |
secunia.com/advisories/30300
www.securityfocus.com/archive/1/492266/100/0/threaded
www.securityfocus.com/archive/1/492274/100/0/threaded
www.securityfocus.com/bid/29283
www.securitytracker.com/id?1020043
www.vupen.com/english/advisories/2008/1573/references
www.zerodayinitiative.com/advisories/ZDI-08-027/
exchange.xforce.ibmcloud.com/vulnerabilities/42524
support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798