Page 3 of 12 results (0.004 seconds)

CVSS: 10.0EPSS: 23%CPEs: 4EXPL: 0

Stack-based buffer overflow in the RPC interface in Mediasvr.exe in Computer Associates (CA) Brightstor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Protection Suites r2 allows remote attackers to execute arbitrary code via crafted SUNRPC packets, aka the "Mediasvr.exe Overflow," a different vulnerability than CVE-2006-5172. Desbordamiento de búfer basado en pila en el interfaz RPC en Mediasvr.exe en Computer Associates (CA) Brightstor ARCserve Backup 9.01 hasta 11.5, Enterprise Backup 10.5, y CA Protection Suites r2 permite a atacantes remotos ejecutar código de su elección mediante paquetes SUNRPC manipulados, también conocido como el "Desbordamiento Mediasvr.exe" una vulnerabilidad distinta a CVE-2006-5172. • http://osvdb.org/31319 http://secunia.com/advisories/23648 http://securitytracker.com/id?1017506 http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp http://www.iss.net/threats/252.html http://www.securityfocus.com/archive/1/456711 http://www.securityfocus.com/bid/22015 http://www.vupen.com/english/advisories/2007/0154 https://exchange.xforce.ibmcloud.com/vulnerabilities/29343 •

CVSS: 10.0EPSS: 2%CPEs: 4EXPL: 1

Stack-based buffer overflow in the RPC interface in Mediasvr.exe in Computer Associates (CA) Brightstor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Protection Suites r2 allows remote attackers to execute arbitrary code via crafted SUNRPC packets, aka the "Mediasvr.exe String Handling Overflow," a different vulnerability than CVE-2006-5171. Desbordamiento de búfer basado en pila en el interfaz RPC de Mediasvr.exe en Computer Associates (CA) Brightstor ARCserve Backup 9.01 hasta 11.5, Enterprise Backup 10.5, y CA Protection Suites r2 permite a atacantes remotos ejecutar código de su elección mediante paquetes SUNRPC artesanales, también conocido como "Mediasvr.exe String Handling Overflow", una vulnerabilidad diferente que CVE-2006-5171. • http://osvdb.org/31320 http://secunia.com/advisories/23648 http://securitytracker.com/id?1017506 http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp http://www.iss.net/threats/253.html http://www.securityfocus.com/archive/1/456711 http://www.securityfocus.com/bid/22016 http://www.vupen.com/english/advisories/2007/0154 https://exchange.xforce.ibmcloud.com/vulnerabilities/29344 •