{"api_version":"1","generated_at":"2026-04-23T04:09:23+00:00","cve":"CVE-2008-2241","urls":{"html":"https://cve.report/CVE-2008-2241","api":"https://cve.report/api/cve/CVE-2008-2241.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-2241","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-2241"},"summary":{"title":"CVE-2008-2241","description":"Directory traversal vulnerability in caloggerd in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allows remote attackers to append arbitrary data to arbitrary files via directory traversal sequences in unspecified input fields, which are used in log messages.  NOTE: this can be leveraged for code execution in many installation environments by writing to a startup file or configuration file.","state":"PUBLISHED","assigner":"mitre","published_at":"2008-05-21 13:24:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-22","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://www.vupen.com/english/advisories/2008/1573/references","name":"http://www.vupen.com/english/advisories/2008/1573/references","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/492274/100/0/threaded","name":"http://www.securityfocus.com/archive/1/492274/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/492266/100/0/threaded","name":"http://www.securityfocus.com/archive/1/492266/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/30300","name":"http://secunia.com/advisories/30300","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"CA ARCserve Backup Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42524","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42524","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798","name":"https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"404 Not Found","mime":"text/html","httpstatus":"404","archivestatus":"400"},{"url":"http://www.securitytracker.com/id?1020043","name":"http://www.securitytracker.com/id?1020043","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"CA ARCserve Backup Input Validation Flaw in caloggerd Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/29283","name":"http://www.securityfocus.com/bid/29283","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Computer Associates ARCserve Backup 'caloggerd' and 'xdr' Functions Multiple Remote Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.zerodayinitiative.com/advisories/ZDI-08-027/","name":"http://www.zerodayinitiative.com/advisories/ZDI-08-027/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-2241","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2241","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"2241","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"brightstor_arcserve_backup","cpe6":"11.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"2241","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"brightstor_arcserve_backup","cpe6":"11.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"2241","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"server_protection_suite","cpe6":"2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"2241","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ca","cpe5":"brightstor_arcserve_backup","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"2241","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ca","cpe5":"brightstor_arcserve_backup","cpe6":"r11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"2241","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ca","cpe5":"business_protection_suite","cpe6":"2.0","cpe7":"*","cpe8":"microsoft_small_business_server_premium","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"2241","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ca","cpe5":"business_protection_suite","cpe6":"2.0","cpe7":"*","cpe8":"microsoft_small_business_server_standard","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T08:58:00.830Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"29283","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/29283"},{"name":"30300","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30300"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.zerodayinitiative.com/advisories/ZDI-08-027/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798"},{"name":"ADV-2008-1573","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1573/references"},{"name":"20080519 ZDI-08-027: CA BrightStor ARCserve Backup Arbitrary File Writing Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/492266/100/0/threaded"},{"name":"ca-arcservebackup-caloggerd-code-execution(42524)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42524"},{"name":"20080519 CA ARCserve Backup caloggerd and xdr Functions Vulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/492274/100/0/threaded"},{"name":"1020043","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020043"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-05-19T00:00:00.000Z","descriptions":[{"lang":"en","value":"Directory traversal vulnerability in caloggerd in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allows remote attackers to append arbitrary data to arbitrary files via directory traversal sequences in unspecified input fields, which are used in log messages.  NOTE: this can be leveraged for code execution in many installation environments by writing to a startup file or configuration file."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-11T19:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"29283","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/29283"},{"name":"30300","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30300"},{"tags":["x_refsource_MISC"],"url":"http://www.zerodayinitiative.com/advisories/ZDI-08-027/"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798"},{"name":"ADV-2008-1573","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1573/references"},{"name":"20080519 ZDI-08-027: CA BrightStor ARCserve Backup Arbitrary File Writing Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/492266/100/0/threaded"},{"name":"ca-arcservebackup-caloggerd-code-execution(42524)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42524"},{"name":"20080519 CA ARCserve Backup caloggerd and xdr Functions Vulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/492274/100/0/threaded"},{"name":"1020043","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020043"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-2241","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Directory traversal vulnerability in caloggerd in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allows remote attackers to append arbitrary data to arbitrary files via directory traversal sequences in unspecified input fields, which are used in log messages.  NOTE: this can be leveraged for code execution in many installation environments by writing to a startup file or configuration file."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"29283","refsource":"BID","url":"http://www.securityfocus.com/bid/29283"},{"name":"30300","refsource":"SECUNIA","url":"http://secunia.com/advisories/30300"},{"name":"http://www.zerodayinitiative.com/advisories/ZDI-08-027/","refsource":"MISC","url":"http://www.zerodayinitiative.com/advisories/ZDI-08-027/"},{"name":"https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798","refsource":"CONFIRM","url":"https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798"},{"name":"ADV-2008-1573","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1573/references"},{"name":"20080519 ZDI-08-027: CA BrightStor ARCserve Backup Arbitrary File Writing Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/492266/100/0/threaded"},{"name":"ca-arcservebackup-caloggerd-code-execution(42524)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42524"},{"name":"20080519 CA ARCserve Backup caloggerd and xdr Functions Vulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/492274/100/0/threaded"},{"name":"1020043","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020043"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-2241","datePublished":"2008-05-21T10:00:00.000Z","dateReserved":"2008-05-16T00:00:00.000Z","dateUpdated":"2024-08-07T08:58:00.830Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-05-21 13:24:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-22","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*","matchCriteriaId":"E37161BE-6AF5-40E0-BD63-2C17431D8B36"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*","matchCriteriaId":"477EE032-D183-478F-A2BF-6165277A7414"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*","matchCriteriaId":"A8781759-7B4C-47C3-8A60-8CA5520360C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:*:*:*:*:*:*","matchCriteriaId":"9190C236-0BBF-47CF-94F5-F2408D33C5CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ca:brightstor_arcserve_backup:r11.0:*:*:*:*:*:*:*","matchCriteriaId":"1812E8C2-895E-4179-B313-22C8EB527544"},{"vulnerable":true,"criteria":"cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_small_business_server_premium:*:*:*:*:*","matchCriteriaId":"1366038C-7552-44C7-BB01-316AA0D088F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_small_business_server_standard:*:*:*:*:*","matchCriteriaId":"D24EEBF9-8301-4E8E-8AE1-E41774EDEFD9"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"2241","Ordinal":"1","Title":"CVE-2008-2241","CVE":"CVE-2008-2241","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"2241","Ordinal":"1","NoteData":"Directory traversal vulnerability in caloggerd in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allows remote attackers to append arbitrary data to arbitrary files via directory traversal sequences in unspecified input fields, which are used in log messages.  NOTE: this can be leveraged for code execution in many installation environments by writing to a startup file or configuration file.","Type":"Description","Title":"CVE-2008-2241"},{"CveYear":"2008","CveId":"2241","Ordinal":"2","NoteData":"2008-05-21","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"2241","Ordinal":"3","NoteData":"2018-10-11","Type":"Other","Title":"Modified"}]}}}