1 results (0.010 seconds)

CVSS: 9.3EPSS: 29%CPEs: 30EXPL: 0

The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments. El control ActiveX DSM gui_cm_ctrls (archivo gui_cm_ctrls.ocx), tal y como es usado en distintos productos de CA, incluyendo a BrightStor ARCServe Backup for Laptops and Desktops versión r11.5, Desktop Management Suite versiones r11.1 hasta r11.2 C2; Unicenter versiones r11.1 hasta r11.2 C2; y Desktop and Server Management versiones r11.1 hasta r11.2 C2, permite a los atacantes remotos ejecutar código arbitrario por medio de argumentos de función diseñados. • http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx http://secunia.com/advisories/29837 http://www.kb.cert.org/vuls/id/684883 http://www.securityfocus.com/archive/1/490959/100/0/threaded http://www.securityfocus.com/bid/28809 http://www.securitytracker.com/id?1019872 http://www.vupen.com/english/advisories/2008/1249/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41853 https://support.ca.com/ • CWE-94: Improper Control of Generation of Code ('Code Injection') •