CVE-2008-1979 – Computer Associates ARCserve Backup Discovery Service Remote - Denial of Service
https://notcve.org/view.php?id=CVE-2008-1979
The Discovery Service (casdscvc) in CA ARCserve Backup 12.0.5454.0 and earlier allows remote attackers to cause a denial of service (crash) via a packet with a large integer value used in an increment to TCP port 41523, which triggers a buffer over-read. El Discovery Service (casdscvc) en CA ARCserve Backup versión 12.0.5454.0 y anteriores, permite a atacantes remotos causar una denegación de servicio (bloqueo de aplicación) por medio de un paquete con un valor entero largo usado en un incremento al puerto TCP 41523, lo que desencadena una lectura excesiva del búfer. • https://www.exploit-db.com/exploits/31707 http://aluigi.altervista.org/adv/carcbackazz-adv.txt http://secunia.com/advisories/29855 http://www.securityfocus.com/archive/1/493430/100/0/threaded http://www.securityfocus.com/bid/28927 http://www.securitytracker.com/id?1020324 http://www.vupen.com/english/advisories/2008/1354 https://exchange.xforce.ibmcloud.com/vulnerabilities/41869 • CWE-189: Numeric Errors •
CVE-2007-5328 – CA BrightStor ARCserve Backup Message Engine Insecure Method Exposure Vulnerability
https://notcve.org/view.php?id=CVE-2007-5328
The Message Engine RPC service in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows attackers to execute arbitrary code by using certain "insecure method calls" to modify the file system and registry, aka "Privileged function exposure." El servicio Message Engine RPC en CA BrightStor ARCServe BackUp versión v9.01 hasta r11.5, y Enterprise Backup r10.5, permite a atacantes ejecutar código arbitrario mediante el uso de ciertas "insecure method calls" para modificar el sistema de archivos y el registro, también se conoce como "Privileged function exposure." This vulnerability allows attackers to arbitrarily access and modify the file system and registry of vulnerable installations of Computer Associates BrightStor ARCserve Backup. Authentication is not required to exploit this vulnerability. The specific flaws exists in the Message Engine RPC service which listens by default on TCP port 6504 with the following UUID: 506b1890-14c8-11d1-bbc3-00805fa6962e The service exposes a number of insecure method calls including: 0x17F, 0x180, 0x181, 0x182, 0x183, 0x184, 0x185, 0x186, 0x187, 0x188, 0x189, 0x18A, 0x18B, and 0x18C. Attackers can leverage these methods to manipulate both the file system and registry which can result in a complete system compromise. • http://secunia.com/advisories/27192 http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp http://www.securityfocus.com/archive/1/482121/100/0/threaded http://www.securityfocus.com/archive/1/484229/100/0/threaded http://www.securityfocus.com/bid/26015 http://www.securitytracker.com/id?1018805 http://www.vupen.com/english/advisories/2007/3470 http://www.zerodayinitiative.com/advisories/ZDI-07-069.html https://exchange.xforce.ibmcloud.com/vulnerabilities/37067 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2007-5327
https://notcve.org/view.php?id=CVE-2007-5327
Stack-based buffer overflow in the RPC interface for the Message Engine (mediasvr.exe) in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to execute arbitrary code via a long argument in the 0x10d opnum. Desbordamiento de búfer basado en pila en el interfaz RPC para el Message Engine (mediasvr.exe) en el CA BrightStor ARCServe BackUp v9.01 hasta la R11.5 y el Enterprise Backup r10.5, permite a atacantes remotos ejecutar código de su elección a través de la inclusión de un argumento largo en el 0x10d opnum. • http://ruder.cdut.net/blogview.asp?logID=231 http://secunia.com/advisories/27192 http://securityreason.com/securityalert/3218 http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp http://www.fortiguardcenter.com/advisory/FGA-2007-11.html http://www.securityfocus.com/archive/1/482112/100/0/threaded http://www.securityfocus.com/archive/1/482121/100/0/threaded http://www.securityfocus.com/bid/26015 http://www.securitytracker.com/id?1018805 http://www.vupen.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-5331
https://notcve.org/view.php?id=CVE-2007-5331
Queue.dll for the message queuing service (LQserver.exe) in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to execute arbitrary code via a malformed ONRPC protocol request for operation 0x76, which causes ARCserve Backup to dereference arbitrary pointers. La biblioteca Queue.dll para el servicio de colas de mensajes (LQserver.exe) en CA BrightStor ARCServe BackUp versión v9.01 hasta R11.5, y Enterprise Backup r10.5, permite a atacantes remotos ejecutar código arbitrario por medio de una petición de protocolo ONRPC malformada para la operación 0x76, lo que hace que ARCserve Backup elimine la referencia de punteros arbitrarios. • http://osvdb.org/41371 http://research.eeye.com/html/advisories/published/AD20071011.html http://secunia.com/advisories/27192 http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp http://www.securityfocus.com/archive/1/482114/100/0/threaded http://www.securityfocus.com/archive/1/482121/100/0/threaded http://www.securityfocus.com/bid/24680 http://www.securitytracker.com/id?1018805 http://www.vupen.com/english/advisories/2007/3470 https://exchange.xforce.ibmcloud • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-5329
https://notcve.org/view.php?id=CVE-2007-5329
Unspecified vulnerability in dbasvr in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, has unknown impact and attack vectors related to memory corruption. Vulnerabilidad sin especificar en el dbasvr del CA BrightStor ARCServe BackUp v9.01 hasta la R11.5 y el Enterprise Backup r10.5, tiene un impacto desconocido y vectores de ataque relacionados con la corrupción de memoria. • http://osvdb.org/41372 http://secunia.com/advisories/27192 http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp http://www.securityfocus.com/archive/1/482121/100/0/threaded http://www.securityfocus.com/bid/26015 http://www.securitytracker.com/id?1018805 http://www.vupen.com/english/advisories/2007/3470 https://exchange.xforce.ibmcloud.com/vulnerabilities/37068 • CWE-399: Resource Management Errors •