Page 9 of 70 results (0.006 seconds)

CVSS: 10.0EPSS: 97%CPEs: 8EXPL: 4

Multiple buffer overflows in LGSERVER.EXE in CA BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.1 SP1, Mobile Backup r4.0, Desktop and Business Protection Suite r2, and Desktop Management Suite (DMS) r11.0 and r11.1 allow remote attackers to execute arbitrary code via crafted packets to TCP port (1) 1900 or (2) 2200. Múltiples desbordamientos de búfer en el archivo LGSERVER.EXE en CA BrightStor ARCserve Backup para Ordenadores Portátiles y de Escritorio versión r11.0 hasta versión r11.1 SP1, Mobile Backup versión r4.0, Desktop and Business Protection Suite versión r2 y Desktop Management Suite (DMS) versiones r11.0 y r11.1 permiten a los atacantes remotos ejecutar código arbitrario por medio de la creación de paquetes hacia los puertos TCP (1) 1900 o (2) 2200. • https://www.exploit-db.com/exploits/3244 https://www.exploit-db.com/exploits/3211 https://www.exploit-db.com/exploits/3218 https://www.exploit-db.com/exploits/16400 http://secunia.com/advisories/23897 http://securitytracker.com/id?1017548 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp http://www.kb.cert.org/vuls/id/357308 http://www.kb.cert.org/vuls/id/611276 http://www.osvdb.org/31593 http://www.securityfocus.com/archive/1& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 23%CPEs: 4EXPL: 0

Stack-based buffer overflow in the RPC interface in Mediasvr.exe in Computer Associates (CA) Brightstor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Protection Suites r2 allows remote attackers to execute arbitrary code via crafted SUNRPC packets, aka the "Mediasvr.exe Overflow," a different vulnerability than CVE-2006-5172. Desbordamiento de búfer basado en pila en el interfaz RPC en Mediasvr.exe en Computer Associates (CA) Brightstor ARCserve Backup 9.01 hasta 11.5, Enterprise Backup 10.5, y CA Protection Suites r2 permite a atacantes remotos ejecutar código de su elección mediante paquetes SUNRPC manipulados, también conocido como el "Desbordamiento Mediasvr.exe" una vulnerabilidad distinta a CVE-2006-5172. • http://osvdb.org/31319 http://secunia.com/advisories/23648 http://securitytracker.com/id?1017506 http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp http://www.iss.net/threats/252.html http://www.securityfocus.com/archive/1/456711 http://www.securityfocus.com/bid/22015 http://www.vupen.com/english/advisories/2007/0154 https://exchange.xforce.ibmcloud.com/vulnerabilities/29343 •

CVSS: 10.0EPSS: 2%CPEs: 4EXPL: 1

Stack-based buffer overflow in the RPC interface in Mediasvr.exe in Computer Associates (CA) Brightstor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Protection Suites r2 allows remote attackers to execute arbitrary code via crafted SUNRPC packets, aka the "Mediasvr.exe String Handling Overflow," a different vulnerability than CVE-2006-5171. Desbordamiento de búfer basado en pila en el interfaz RPC de Mediasvr.exe en Computer Associates (CA) Brightstor ARCserve Backup 9.01 hasta 11.5, Enterprise Backup 10.5, y CA Protection Suites r2 permite a atacantes remotos ejecutar código de su elección mediante paquetes SUNRPC artesanales, también conocido como "Mediasvr.exe String Handling Overflow", una vulnerabilidad diferente que CVE-2006-5171. • http://osvdb.org/31320 http://secunia.com/advisories/23648 http://securitytracker.com/id?1017506 http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp http://www.iss.net/threats/253.html http://www.securityfocus.com/archive/1/456711 http://www.securityfocus.com/bid/22016 http://www.vupen.com/english/advisories/2007/0154 https://exchange.xforce.ibmcloud.com/vulnerabilities/29344 •

CVSS: 7.5EPSS: 95%CPEs: 4EXPL: 2

The Tape Engine service in Computer Associates (CA) BrightStor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Server/Business Protection Suite r2 allows remote attackers to execute arbitrary code via certain data in opnum 0xBF in an RPC request, which is directly executed. El servicio Tape Engine en Computer Associates (CA) BrightStor ARCserve Backup 9.01 hasta 11.5, Enterprise Backup 10.5, y CA Server/Business Protection Suite r2 permite a atacantes remotos ejecutar código de su elección mediante ciertos datos en opnum 0xBF en una petición RPC que es directamente ejecutada. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Backup. User interaction is not required to exploit this vulnerability. The specific flaw exists in the handling of RPC requests to the Tape Engine service which listens by default on TCP port 6502 with the following UUID: 62b93df0-8b02-11ce-876c-00805f842837 The handler function for RPC opnum 0xBF directly calls user-supplied data in the RPC request, resulting in trivial arbitrary code execution. • https://www.exploit-db.com/exploits/29444 http://livesploit.com/advisories/LS-20061002.pdf http://osvdb.org/31327 http://secunia.com/advisories/23648 http://securitytracker.com/id?1017506 http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp http://www.kb.cert.org/vuls/id/662400 http://www.lssec.com/advisories/LS-20061002.pdf http://www.securityfocus.com/archive/1/456616/100/0/threaded http://www.securityfocus.com/archive/1/456637 http://www.secur •

CVSS: 7.5EPSS: 95%CPEs: 4EXPL: 3

Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Server/Business Protection Suite r2 allow remote attackers to execute arbitrary code via RPC requests with crafted data for opnums (1) 0x2F and (2) 0x75 in the (a) Message Engine RPC service, or opnum (3) 0xCF in the Tape Engine service. Unos desbordamientos de búfer múltiples en Computer Associates (CA) BrightStor ARCserve Backup versión 9.01 hasta versión 11.5, Enterprise Backup versión 10.5 y CA Server/Business Protection Suite r2, permiten a los atacantes remotos ejecutar código arbitrario por medio de peticiones RPC con datos creados para opnums (1) 0x2F y (2) 0x75 en (a) el servicio RPC del Motor Message, o opnum (3) 0xCF en el servicio del Motor Tape. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Backup. User interaction is not required to exploit this vulnerability. The specific flaw exists in the Tape Engine RPC service which listens by default on TCP port 6503 with the following UUID: 2b93df0-8b02-11ce-876c-00805f842837 The service exposes a buffer overflow in the handler for RPC opnum 0xCF that allows for arbitrary code execution when handling user-supplied data from the RPC request. • https://www.exploit-db.com/exploits/16418 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=467 http://osvdb.org/31327 http://secunia.com/advisories/23648 http://securitytracker.com/id?1017506 http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp http://www.kb.cert.org/vuls/id/151032 http://www.kb.cert.org/vuls/id/180336 http://www.securityfocus.com/archive/1/456618/100/0/threaded http://www.securityfocus.com/archive/1/456619/100&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •