Re: CA ARCserve D2D r15 GWT RPC Request Auth Bypass / Credential
FYI, we have published a fix for this issue.
https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=3DRO33517&os=3D=
W
INDOWS&actionID=3D3
A formal security notice will be published next week.
Thanks and regards,
Ken Williams, Director
CA Technologies Product Vulnerability Response Team
CA Technologies Business Unit Operations
wilja22@ca.com
-----Original Message-----
From: Williams, James K=20
Sent: Tuesday, July 26, 2011 1:12 PM
To: bugtraq@securityfocus.com
Subject: Re: CA ARCserve D2D r15 GWT RPC Request Auth Bypass /
Credentials
Re: CA ARCserve D2D r15 GWT RPC Request Auth Bypass / Credentials
CA Technologies is aware of ARCserve D2D vulnerability and exploit=20
details that were posted to BugTraq on 2011-07-26. We're currently
reviewing the information and will post an update after we have=20
completed our initial investigation.
Thanks and regards,
Ken Williams, Director
CA Technologies Product Vulnerability Response Team
CA Technologies Business Unit Operations
wilja22@ca.com
討論串 (同標題文章)
完整討論串 (本文為第 2 之 2 篇):