20 results (0.015 seconds)

CVSS: 5.0EPSS: 54%CPEs: 1EXPL: 2

The Discovery Service (casdscvc) in CA ARCserve Backup 12.0.5454.0 and earlier allows remote attackers to cause a denial of service (crash) via a packet with a large integer value used in an increment to TCP port 41523, which triggers a buffer over-read. El Discovery Service (casdscvc) en CA ARCserve Backup versión 12.0.5454.0 y anteriores, permite a atacantes remotos causar una denegación de servicio (bloqueo de aplicación) por medio de un paquete con un valor entero largo usado en un incremento al puerto TCP 41523, lo que desencadena una lectura excesiva del búfer. • https://www.exploit-db.com/exploits/31707 http://aluigi.altervista.org/adv/carcbackazz-adv.txt http://secunia.com/advisories/29855 http://www.securityfocus.com/archive/1/493430/100/0/threaded http://www.securityfocus.com/bid/28927 http://www.securitytracker.com/id?1020324 http://www.vupen.com/english/advisories/2008/1354 https://exchange.xforce.ibmcloud.com/vulnerabilities/41869 • CWE-189: Numeric Errors •

CVSS: 4.3EPSS: 40%CPEs: 41EXPL: 0

arclib.dll before 7.3.0.9 in CA Anti-Virus (formerly eTrust Antivirus) 8 and certain other CA products allows remote attackers to cause a denial of service (infinite loop and loss of antivirus functionality) via an invalid "previous listing chunk number" field in a CHM file. arclib.dll anterior a 7.3.0.9 en CA Anti-Virus (formalmente eTrust Antivirus) 8 y otros ciertos productos CA permiten a atacantes remotos provocar denegación de servicio (bucles infinitos y perdida de funcionalidad antivirus) a través de un campo"listado previo de un trozo de número" en un cierto archivo CHM. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567 http://secunia.com/advisories/26155 http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847 http://www.securityfocus.com/archive/1/474601/100/0/threaded http://www.securityfocus.com/archive/1/474605/100/100/threaded http://www.securityfocus.com/archive/1/474683/100/0/threaded http://www.securityfocus.com/bid/25049 http: •

CVSS: 9.3EPSS: 93%CPEs: 33EXPL: 1

Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file. Desbordamiento de búfer basado en pila en el motor antivirus anterior a la actualización de contenido 30.6 de múltiples productos CA (antiguamente Computer Associates) permite a atacantes remotos ejecutar código de su elección mediante un valor largo no válido del campo coffFiles en un fichero .CAB. This vulnerability allows remote attackers to execute arbitrary code onvulnerable installations of various Computer Associates products. The specific flaw exists within the processing of an improperly defined "coffFiles" field in .CAB archives. Large values result in an unbounded data copy operation which can result in an exploitable stack-based buffer overflow. • https://www.exploit-db.com/exploits/16677 http://secunia.com/advisories/25570 http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp http://www.kb.cert.org/vuls/id/105105 http://www.osvdb.org/35245 http://www.securityfocus.com/archive/1/470602/100/0/threaded http://www.securityfocus.com/archive/1/470754/100/0/threaded http://www.securityfocus.com/bid/24330 http://www.securitytracker.com/id?1018199 http://www.vupen.com/english/advisories/2007& •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The Tape Engine in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 and earlier allows remote attackers to cause a denial of service (disabled interface) by calling an unspecified RPC function. El motor Tape en CA (formalmente Computer Associates) BrightStor ARCserve Backup 11.5 y anteriores permite a atacantes remotos provocar una denegación de servicio (deshabilitado del interfaz) llamando a una función RPC no especificada. • http://secunia.com/advisories/24512 http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp http://www.kb.cert.org/vuls/id/647273 http://www.osvdb.org/32991 http://www.securityfocus.com/bid/22994 http://www.securitytracker.com/id?1017783 http://www.vupen.com/english/advisories/2007/0971 http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317 https://exchange.xforce.ibmcloud.com/vulnerabilities/33020 •

CVSS: 10.0EPSS: 89%CPEs: 1EXPL: 0

The Tape Engine in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain RPC procedure arguments, which result in memory corruption, a different vulnerability than CVE-2006-6076. El motor de cinta en CA (formalmente Computer Associates) BrightStor ARCserve Backup 11.5 y anteriores permite a atacantes remotos provocar denegación de servicio y posiblemente ejecutar código de su elección a través de ciertos argumentos de procesos RPC, lo cual deriva en una corrupción memoria, una vulnerabilidad diferente que la CVE-2006-6076. • http://secunia.com/advisories/24512 http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp http://www.kb.cert.org/vuls/id/375353 http://www.osvdb.org/32990 http://www.securityfocus.com/bid/22994 http://www.securitytracker.com/id?1017783 http://www.vupen.com/english/advisories/2007/0971 http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317 https://exchange.xforce.ibmcloud.com/vulnerabilities/33017 •