7 results (0.011 seconds)

CVSS: 10.0EPSS: 9%CPEs: 15EXPL: 0

Integer underflow in rxRPC.dll in the LGServer service in the server in CA ARCserve Backup for Laptops and Desktops 11.0 through 11.5 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted message that triggers a buffer overflow. Subdesbordamiento de enteros en la biblioteca rxRPC.dll en el servicio LGServer en el servidor en CA ARCserve Backup versiones 11.0 hasta 11.5 para ordenadores Portátiles y Escritorios, permite a los atacantes remotos ejecutar código arbitrario o causar una denegación de servicio por medio de un mensaje diseñado que desencadena un desbordamiento de búfer. • http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063594.html http://secunia.com/advisories/31319 http://www.securityfocus.com/archive/1/495020/100/0/threaded http://www.securityfocus.com/bid/30472 http://www.securitytracker.com/id?1020590 http://www.vupen.com/english/advisories/2008/2286 https://exchange.xforce.ibmcloud.com/vulnerabilities/44137 https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=181721 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 93%CPEs: 30EXPL: 3

Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method. Un desbordamiento de búfer en la región stack de la memoria en el control ActiveX ListCtrl (ListCtrl.ocx), como es usado en varios productos de CA, incluyendo BrightStor ARCserve Backup versión R11.5, Desktop Management Suite versiones r11.1 hasta r11.2 y productos Unicenter versiones r11.1 hasta r11. 2, permite a los atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (bloqueo) por medio de un argumento largo en el método AddColumn. The CA BrightStor ARCserve Backup ActiveX control (ListCtrl.ocx) is vulnerable to a stack-based buffer overflow. By passing an overly long argument to the AddColumn() method, a remote attacker could overflow a buffer and execute arbitrary code on the system. • https://www.exploit-db.com/exploits/16577 https://www.exploit-db.com/exploits/5264 http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx http://secunia.com/advisories/29408 http://www.securityfocus.com/archive/1/489893/100/0/threaded http://www.securityfocus.com/archive/1/490263/100/0/threaded http://www.securityfocus.com/bid/28268 http://www.securitytracker.com/id?1019617 http://www.vupen.com/english/advisories/2008/0902/references https://exchange. • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 91%CPEs: 9EXPL: 0

Integer overflow in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allows remote attackers to execute arbitrary code via a long username and a certain "useless" password. Desbordamiento de entero en en pila en CA (Computer Associates) BrightStor ARCserve Backup para Portátil y Sobremesa r11.0 hasta r11.5 permite a atacantes remotos ejecutar código de su elección mediante un nombre de usuario largo y determinadas contraseñas "sin uso". • http://research.eeye.com/html/advisories/published/AD20070920.html http://secunia.com/advisories/25606 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35675 http://www.securityfocus.com/archive/1/480252/100/100/threaded http://www.securityfocus.com/bid/24348 http://www.securitytracker.com/id?1018728 • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 93%CPEs: 9EXPL: 1

Multiple stack-based buffer overflows in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allow remote attackers to execute arbitrary code via a long (1) username or (2) password to the rxrLogin command in rxRPC.dll, or a long (3) username argument to the GetUserInfo function. Múltiples desbordamientos de búfer basado en pila en CA (Computer Associates) BrightStor ARCserve Backup para Portátil y Sobremesa r11.0 hasta r11.5 permiten a atacantes remotos ejecutar código de su elección mediante un (1) nombre de usuario ó (2) contraseña largos en el comando rxrLogin de rxRPC.dll, ó un (3) argumento nombre de usuario largo en la función GetUserInfo. • https://www.exploit-db.com/exploits/16411 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=599 http://research.eeye.com/html/advisories/published/AD20070920.html http://secunia.com/advisories/25606 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674 http://www.securityfocus.com/archive/1/480252/100/100 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 6%CPEs: 9EXPL: 0

Directory traversal vulnerability in rxRPC.dll in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allows remote attackers to upload and overwrite arbitrary files via a ..\ (dot dot backslash) sequence in the destination filename argument to sub-function 8 in the rxrReceiveFileFromServer command. Vulnerabilidad de salto de directorio en rxRPC.dll de CA (Computer Associates) BrightStor ARCserve Backup para Portátil y Sobremesa r11.0 hasta r11.5 permite a atacantes remotos subir y sobrescribir ficheros de su elección mediante una secuencia ..\ (punto punto barra invertida) en el argumento fichero destino en la sub-función 8 en el comando rxrReceiveFileFromServer. • http://research.eeye.com/html/advisories/published/AD20070920.html http://secunia.com/advisories/25606 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35676 http://www.securityfocus.com/archive/1/480252/100/100/threaded http://www.securityfocus.com/bid/24348 http://www.securitytracker.com/id?1018728 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •