Page 3 of 53 results (0.004 seconds)

CVSS: 10.0EPSS: 3%CPEs: 6EXPL: 0

The cadbd RPC service in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to (1) execute arbitrary code via stack-based buffer overflows in unspecified RPC procedures, and (2) trigger memory corruption related to the use of "handle" RPC arguments as pointers. El servicio RPC cadbd de CA BrightStor ARCServer BackUp v9.01 hasta R11.5, y Enterprise Backup r10.5, permite a atacantes remotos (1) ejecutar código de su elección mediante desbordamientos de búfer basado en pila en procedimientos RPC no especificados, y (2) disparar una corrupción de memoria relacionada con el uso de argumentos RPC "handle" como punteros. • http://osvdb.org/41373 http://osvdb.org/41374 http://secunia.com/advisories/27192 http://secunia.com/secunia_research/2007-62/advisory http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp http://www.securityfocus.com/archive/1/482121/100/0/threaded http://www.securityfocus.com/bid/26015 http://www.securitytracker.com/id?1018805 http://www.vupen.com/english/advisories/2007/3470 https://exchange.xforce.ibmcloud.com/vulnerabilities/37070 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 93%CPEs: 6EXPL: 1

Multiple unspecified vulnerabilities in (1) mediasvr and (2) caloggerd in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, have unknown impact and attack vectors related to memory corruption. Múltiples vulnerabilidades no especificadas en (1) mediasvr y (2) caloggerd de CA BrightStor ARCServe BackUp v9.01 hasta R11.5, y Enterprise Backup r10.5, tienen impacto desconocido y vectores de ataque relativos a corrupción de memoria. • https://www.exploit-db.com/exploits/30046 http://osvdb.org/41366 http://osvdb.org/41367 http://secunia.com/advisories/27192 http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp http://www.securityfocus.com/archive/1/482121/100/0/threaded http://www.securityfocus.com/bid/24017 http://www.securitytracker.com/id?1018805 http://www.vupen.com/english/advisories/2007/3470 https://exchange.xforce.ibmcloud.com/vulnerabilities/37072 • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 27%CPEs: 6EXPL: 0

Multiple buffer overflows in (1) the Message Engine and (2) AScore.dll in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allow remote attackers to execute arbitrary code via unspecified vectors. Múltiples desbordamientos de búfer en (1) el Motor de Mensajería (Message Engine) y (2) AScore.dll de CA BrightStor ARCServe BackUp v9.01 hasta R11.5, y Enterprise Backup r10.5, permiten a atacantes remotos ejecutar código de su elección a través de vectores no especificados. • http://secunia.com/advisories/27192 http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp http://www.securityfocus.com/archive/1/482121/100/0/threaded http://www.securityfocus.com/bid/26015 http://www.securitytracker.com/id?1018805 http://www.vupen.com/english/advisories/2007/3470 https://exchange.xforce.ibmcloud.com/vulnerabilities/37063 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 93%CPEs: 9EXPL: 1

Multiple stack-based buffer overflows in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allow remote attackers to execute arbitrary code via a long (1) username or (2) password to the rxrLogin command in rxRPC.dll, or a long (3) username argument to the GetUserInfo function. Múltiples desbordamientos de búfer basado en pila en CA (Computer Associates) BrightStor ARCserve Backup para Portátil y Sobremesa r11.0 hasta r11.5 permiten a atacantes remotos ejecutar código de su elección mediante un (1) nombre de usuario ó (2) contraseña largos en el comando rxrLogin de rxRPC.dll, ó un (3) argumento nombre de usuario largo en la función GetUserInfo. • https://www.exploit-db.com/exploits/16411 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=599 http://research.eeye.com/html/advisories/published/AD20070920.html http://secunia.com/advisories/25606 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674 http://www.securityfocus.com/archive/1/480252/100/100 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 6%CPEs: 9EXPL: 0

Multiple command handlers in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 do not verify if a peer is authenticated, which allows remote attackers to add and delete users, and start client restores. Múltiples gestores de comandos de CA (Computer Associates) BrightStor ARCserve Backup para Portátil y Sobremesa r11.0 hasta r11.5 no verifican si un par está autenticado, lo cual permite a atacantes remotos añadir y borrar usuarios, e inicializar recuperaciones de cliente. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=598 http://secunia.com/advisories/25606 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35677 http://www.securityfocus.com/archive/1/480252/100/100/threaded http://www.securityfocus.com/bid/24348 http://www.securitytracker.com/id?1018728 • CWE-287: Improper Authentication •