Did you try www.milw0rm.org?  I searched for 'Brightstor', I almost
got 20 results.

Ravi

On Thu, May 15, 2008 at 5:31 AM, M P Sairam <[EMAIL PROTECTED]> wrote:
> Hi,
>     I'm developing a tool for testing the effectiveness of IPS/IDS devices
> against various exploits. I could not find any working Poc for this
> particular vulnerability.
>
>     Please help me out with any information about any working exploit for
> this vulnerability or Poc.
>
> Details:
>
> Exploit: CA Brightstor ARCserve Backup dbasvr.exe memory corruption
> vulnerability
>
> Product: CA ARCserv Backup r11.5
>
> Description:
> A remote stack overflow vulnerability exist in the RPC interface of CA
> BrightStor ARCServe BackUp. An arbitrary anonymous attacker can execute
> arbitrary code on the affected system by exploiting this vulnerability.
>
> CAN ID: 2007-5329
> <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5329>
> BID: 26015 <http://www.securityfocus.com/bid/26015>
>
> Thanks in advance,
> Sairam
>
>
>
> ********************************************************************************
> This email message (including any attachments) is for the sole use of the
> intended recipient(s) and may contain confidential, proprietary and
> privileged information. Any unauthorized review, use, disclosure or
> distribution is prohibited. If you are not the intended recipient, please
> immediately notify the sender by reply email and destroy all copies of the
> original message. Thank you.
>
> Intoto Inc.
>
> ------------------------------------------------------------------------
> Test Your IDS
>
> Is your IDS deployed correctly?
> Find out quickly and easily by testing it with real-world attacks from CORE
> IMPACT.
> Go to
> http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
> to learn more.
> ------------------------------------------------------------------------
>
>

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
 
to learn more.
------------------------------------------------------------------------

Reply via email to