CA.Alert.Notification.Server.Buffer.Overflow
Description
This indicates an attempt to exploit a buffer overflow vulnerability in Computer Associates Alert Notification Server.
The vulnerability is in the RPC implementation in alert.exe versions before 8.0.255.0. It is caused by a stack based buffer overflow that occurs when handling the RPC Client's input. As a result remote attackers may be able to execute arbitrary code via RPC calls with long stub data.
Affected Products
CA Threat Manager for the Enterprise (eTrust Integrated Threat Management) r8
CA Protection Suites r3
BrightStor ARCserve Backup r11.5
BrightStor ARCserve Backup r11.1
BrightStor ARCserve Backup r11 for Windows
BrightStor Enterprise Backup r10.5
BrightStor ARCserve Backup v9.01
BrightStor ARCserve Client agent for Windows
Impact
System compromise: remote code execution.
Recommended Actions
Apply patch,available from the following Web site:
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |