Re: CA ARCserve D2D r15 GWT RPC Request Auth Bypass / Credential

看板Bugtraq作者時間14年前 (2011/08/10 04:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/2 (看更多)
FYI, we have published a fix for this issue. https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=3DRO33517&os=3D= W INDOWS&actionID=3D3 A formal security notice will be published next week. Thanks and regards, Ken Williams, Director CA Technologies Product Vulnerability Response Team CA Technologies Business Unit Operations wilja22@ca.com -----Original Message----- From: Williams, James K=20 Sent: Tuesday, July 26, 2011 1:12 PM To: bugtraq@securityfocus.com Subject: Re: CA ARCserve D2D r15 GWT RPC Request Auth Bypass / Credentials Re: CA ARCserve D2D r15 GWT RPC Request Auth Bypass / Credentials CA Technologies is aware of ARCserve D2D vulnerability and exploit=20 details that were posted to BugTraq on 2011-07-26. We're currently reviewing the information and will post an update after we have=20 completed our initial investigation. Thanks and regards, Ken Williams, Director CA Technologies Product Vulnerability Response Team CA Technologies Business Unit Operations wilja22@ca.com
文章代碼(AID): #1EGP7_0N (Bugtraq)
文章代碼(AID): #1EGP7_0N (Bugtraq)