[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108741

 
 

909

 
 

85467

 
 

134

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2006-5143Date: (C)2006-10-10   (M)2018-02-19


Multiple buffer overflows in CA BrightStor ARCserve Backup r11.5 SP1 and earlier, r11.1, and 9.01; BrightStor ARCserve Backup for Windows r11; BrightStor Enterprise Backup 10.5; Server Protection Suite r2; and Business Protection Suite r2 allow remote attackers to execute arbitrary code via crafted data on TCP port 6071 to the Backup Agent RPC Server (DBASVR.exe) using the RPC routines with opcode (1) 0x01, (2) 0x02, or (3) 0x18; invalid stub data on TCP port 6503 to the RPC routines with opcode (4) 0x2b or (5) 0x2d in ASCORE.dll in the Message Engine RPC Server (msgeng.exe); (6) a long hostname on TCP port 41523 to ASBRDCST.DLL in the Discovery Service (casdscsvc.exe); or unspecified vectors related to the (7) Job Engine Service.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 7.5
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: PARTIAL
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  
Reference:
SECTRACK-1017003
SECTRACK-1017004
SECTRACK-1017005
SECTRACK-1017006
http://www.securityfocus.com/archive/1/archive/1/447862/100/100/threaded
http://www.securityfocus.com/archive/1/archive/1/447847/100/200/threaded
http://www.securityfocus.com/archive/1/archive/1/447848/100/100/threaded
20061006
http://www.securityfocus.com/archive/1/archive/1/447839/100/100/threaded
http://www.securityfocus.com/archive/1/archive/1/447926/100/200/threaded
http://www.securityfocus.com/archive/1/archive/1/447930/100/200/threaded
http://www.securityfocus.com/archive/1/archive/1/447927/100/200/threaded
BID-20365
SECUNIA-22285
ADV-2006-3930
VU#361792
VU#860048
ca-dbasvr-rpc-bo(29364)
http://supportconnectw.ca.com/public/storage/infodocs/basbr-secnotice.asp
http://www.lssec.com/advisories/LS-20060220.pdf
http://www.lssec.com/advisories/LS-20060313.pdf
http://www.lssec.com/advisories/LS-20060330.pdf
http://www.tippingpoint.com/security/advisories/TSRT-06-11.html
http://www.zerodayinitiative.com/advisories/ZDI-06-030.html
http://www.zerodayinitiative.com/advisories/ZDI-06-031.html
http://www3.ca.com/securityadvisor/blogs/posting.aspx?pid=93775&id=90744
http://www3.ca.com/securityadvisor/blogs/posting.aspx?pid=94397&id=90744
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34693

CPE    6
cpe:/a:ca:brightstor_arcserve_backup:9.01
cpe:/a:ca:business_protection_suite:2.0
cpe:/a:ca:server_protection_suite:2
cpe:/a:ca:brightstor_arcserve_backup:11.1
...
CWE    1
CWE-119

© SecPod Technologies