Page 2 of 13 results (0.047 seconds)

CVSS: 7.8EPSS: 2%CPEs: 9EXPL: 0

LGSERVER.EXE in BrightStor ARCserve Backup for Laptops & Desktops r11.1 allows remote attackers to cause a denial of service (daemon crash) via a value of 0xFFFFFFFF at a certain point in an authentication negotiation packet, which results in an out-of-bounds read. El archivo LGSERVER.EXE en BrightStor ARCserve Backup para Ordenadores Portátiles y de Escritorio versión r11.1 permite a los atacantes remotos causar una denegación de servicio (bloqueo del demonio) por medio de un valor de 0xFFFFFFFF en un determinado punto en un paquete de negociación de autenticación, resultando en una lectura fuera de límites. • http://osvdb.org/32948 http://securityreason.com/securityalert/2218 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp http://www.securityfocus.com/archive/1/458650/100/0/threaded http://www.securityfocus.com/bid/22337 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 1%CPEs: 9EXPL: 0

LGSERVER.EXE in BrightStor Mobile Backup 4.0 allows remote attackers to cause a denial of service (disk consumption and daemon hang) via a value of 0xFFFFFF7F at a certain point in an authentication negotiation packet, which writes a large amount of data to a .USX file in CA_BABLDdata\Server\data\transfer\. LGSERVER.EXE de BrightStor Mobile Backup 4.0 permite a atacantes remotos provocar una denegación de servicio (agotamiento de disco y colapso de demonio) mediante un valor 0xFFFFFF7F en un punto concreto en un paquete de negociación de autenticación, que escribe una cantidad grade de datos a un fichero . USX en CA_BABLDdata\Server\data\transfer\. • http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp http://www.securityfocus.com/archive/1/458653/100/0/threaded http://www.securityfocus.com/bid/22339 •

CVSS: 10.0EPSS: 97%CPEs: 8EXPL: 4

Multiple buffer overflows in LGSERVER.EXE in CA BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.1 SP1, Mobile Backup r4.0, Desktop and Business Protection Suite r2, and Desktop Management Suite (DMS) r11.0 and r11.1 allow remote attackers to execute arbitrary code via crafted packets to TCP port (1) 1900 or (2) 2200. Múltiples desbordamientos de búfer en el archivo LGSERVER.EXE en CA BrightStor ARCserve Backup para Ordenadores Portátiles y de Escritorio versión r11.0 hasta versión r11.1 SP1, Mobile Backup versión r4.0, Desktop and Business Protection Suite versión r2 y Desktop Management Suite (DMS) versiones r11.0 y r11.1 permiten a los atacantes remotos ejecutar código arbitrario por medio de la creación de paquetes hacia los puertos TCP (1) 1900 o (2) 2200. • https://www.exploit-db.com/exploits/3244 https://www.exploit-db.com/exploits/3211 https://www.exploit-db.com/exploits/3218 https://www.exploit-db.com/exploits/16400 http://secunia.com/advisories/23897 http://securitytracker.com/id?1017548 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp http://www.kb.cert.org/vuls/id/357308 http://www.kb.cert.org/vuls/id/611276 http://www.osvdb.org/31593 http://www.securityfocus.com/archive/1& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 95%CPEs: 4EXPL: 2

The Tape Engine service in Computer Associates (CA) BrightStor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Server/Business Protection Suite r2 allows remote attackers to execute arbitrary code via certain data in opnum 0xBF in an RPC request, which is directly executed. El servicio Tape Engine en Computer Associates (CA) BrightStor ARCserve Backup 9.01 hasta 11.5, Enterprise Backup 10.5, y CA Server/Business Protection Suite r2 permite a atacantes remotos ejecutar código de su elección mediante ciertos datos en opnum 0xBF en una petición RPC que es directamente ejecutada. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Backup. User interaction is not required to exploit this vulnerability. The specific flaw exists in the handling of RPC requests to the Tape Engine service which listens by default on TCP port 6502 with the following UUID: 62b93df0-8b02-11ce-876c-00805f842837 The handler function for RPC opnum 0xBF directly calls user-supplied data in the RPC request, resulting in trivial arbitrary code execution. • https://www.exploit-db.com/exploits/29444 http://livesploit.com/advisories/LS-20061002.pdf http://osvdb.org/31327 http://secunia.com/advisories/23648 http://securitytracker.com/id?1017506 http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp http://www.kb.cert.org/vuls/id/662400 http://www.lssec.com/advisories/LS-20061002.pdf http://www.securityfocus.com/archive/1/456616/100/0/threaded http://www.securityfocus.com/archive/1/456637 http://www.secur •

CVSS: 7.5EPSS: 95%CPEs: 4EXPL: 3

Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Server/Business Protection Suite r2 allow remote attackers to execute arbitrary code via RPC requests with crafted data for opnums (1) 0x2F and (2) 0x75 in the (a) Message Engine RPC service, or opnum (3) 0xCF in the Tape Engine service. Unos desbordamientos de búfer múltiples en Computer Associates (CA) BrightStor ARCserve Backup versión 9.01 hasta versión 11.5, Enterprise Backup versión 10.5 y CA Server/Business Protection Suite r2, permiten a los atacantes remotos ejecutar código arbitrario por medio de peticiones RPC con datos creados para opnums (1) 0x2F y (2) 0x75 en (a) el servicio RPC del Motor Message, o opnum (3) 0xCF en el servicio del Motor Tape. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Backup. User interaction is not required to exploit this vulnerability. The specific flaw exists in the Tape Engine RPC service which listens by default on TCP port 6503 with the following UUID: 2b93df0-8b02-11ce-876c-00805f842837 The service exposes a buffer overflow in the handler for RPC opnum 0xCF that allows for arbitrary code execution when handling user-supplied data from the RPC request. • https://www.exploit-db.com/exploits/16418 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=467 http://osvdb.org/31327 http://secunia.com/advisories/23648 http://securitytracker.com/id?1017506 http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp http://www.kb.cert.org/vuls/id/151032 http://www.kb.cert.org/vuls/id/180336 http://www.securityfocus.com/archive/1/456618/100/0/threaded http://www.securityfocus.com/archive/1/456619/100&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •