All the vulnerabilites related to broadcom - arcserve_backup_2000
cve-2001-0959
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 04:37
Severity ?
EPSS score ?
Summary
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 creates a hidden share named ARCSERVE$, which allows remote attackers to obtain sensitive information and overwrite critical files.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.osvdb.org/5483 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7122 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/3342 | vdb-entry, x_refsource_BID | |
http://support.ca.com/Download/patches/asitnt/QO00945.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:37:06.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20010915 ARCserve 6.61 Share Access Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html" }, { "name": "5483", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5483" }, { "name": "arcserve-aremote-plaintext(7122)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122" }, { "name": "3342", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3342" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://support.ca.com/Download/patches/asitnt/QO00945.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-09-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 creates a hidden share named ARCSERVE$, which allows remote attackers to obtain sensitive information and overwrite critical files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-25T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20010915 ARCserve 6.61 Share Access Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html" }, { "name": "5483", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5483" }, { "name": "arcserve-aremote-plaintext(7122)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122" }, { "name": "3342", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3342" }, { "tags": [ "x_refsource_MISC" ], "url": "http://support.ca.com/Download/patches/asitnt/QO00945.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0959", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 creates a hidden share named ARCSERVE$, which allows remote attackers to obtain sensitive information and overwrite critical files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20010915 ARCserve 6.61 Share Access Vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html" }, { "name": "5483", "refsource": "OSVDB", "url": "http://www.osvdb.org/5483" }, { "name": "arcserve-aremote-plaintext(7122)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122" }, { "name": "3342", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3342" }, { "name": "http://support.ca.com/Download/patches/asitnt/QO00945.html", "refsource": "MISC", "url": "http://support.ca.com/Download/patches/asitnt/QO00945.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0959", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-01-31T00:00:00", "dateUpdated": "2024-08-08T04:37:06.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2535
Vulnerability from cvelistv5
Published
2005-08-10 04:00
Modified
2024-08-07 22:30
Severity ?
EPSS score ?
Summary
Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19320 | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/966880 | third-party-advisory, x_refsource_CERT-VN | |
http://archives.neohapsis.com/archives/bugtraq/2005-02/0201.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/12536 | vdb-entry, x_refsource_BID | |
http://archives.neohapsis.com/archives/bugtraq/2005-02/0141.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.osvdb.org/13814 | vdb-entry, x_refsource_OSVDB | |
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?ID=32478 | x_refsource_CONFIRM | |
http://secunia.com/advisories/14293 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:30:01.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20050211 BrightStor ARCserve Backup buffer overflow PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html" }, { "name": "brightstor-discovery-servicepc-bo(19320)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19320" }, { "name": "VU#966880", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/966880" }, { "name": "20050215 Re: BrightStor ARCserve Backup buffer overflow PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0201.html" }, { "name": "12536", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12536" }, { "name": "20050211 Re: BrightStor ARCserve Backup buffer overflow PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0141.html" }, { "name": "13814", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/13814" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?ID=32478" }, { "name": "14293", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14293" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20050211 BrightStor ARCserve Backup buffer overflow PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html" }, { "name": "brightstor-discovery-servicepc-bo(19320)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19320" }, { "name": "VU#966880", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/966880" }, { "name": "20050215 Re: BrightStor ARCserve Backup buffer overflow PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0201.html" }, { "name": "12536", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12536" }, { "name": "20050211 Re: BrightStor ARCserve Backup buffer overflow PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0141.html" }, { "name": "13814", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/13814" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?ID=32478" }, { "name": "14293", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14293" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20050211 BrightStor ARCserve Backup buffer overflow PoC", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html" }, { "name": "brightstor-discovery-servicepc-bo(19320)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19320" }, { "name": "VU#966880", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/966880" }, { "name": "20050215 Re: BrightStor ARCserve Backup buffer overflow PoC", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0201.html" }, { "name": "12536", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12536" }, { "name": "20050211 Re: BrightStor ARCserve Backup buffer overflow PoC", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0141.html" }, { "name": "13814", "refsource": "OSVDB", "url": "http://www.osvdb.org/13814" }, { "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?ID=32478", "refsource": "CONFIRM", "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?ID=32478" }, { "name": "14293", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14293" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2535", "datePublished": "2005-08-10T04:00:00", "dateReserved": "2005-08-10T00:00:00", "dateUpdated": "2024-08-07T22:30:01.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0960
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 04:37
Severity ?
EPSS score ?
Summary
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which allows local and remote attackers to gain privileges.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7122 | vdb-entry, x_refsource_XF | |
http://support.ca.com/Download/patches/asitnt/QO00945.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/3343 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:37:07.126Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20010915 ARCserve 6.61 Share Access Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html" }, { "name": "arcserve-aremote-plaintext(7122)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://support.ca.com/Download/patches/asitnt/QO00945.html" }, { "name": "3343", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3343" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-09-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which allows local and remote attackers to gain privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-06T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20010915 ARCserve 6.61 Share Access Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html" }, { "name": "arcserve-aremote-plaintext(7122)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122" }, { "tags": [ "x_refsource_MISC" ], "url": "http://support.ca.com/Download/patches/asitnt/QO00945.html" }, { "name": "3343", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3343" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which allows local and remote attackers to gain privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20010915 ARCserve 6.61 Share Access Vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html" }, { "name": "arcserve-aremote-plaintext(7122)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122" }, { "name": "http://support.ca.com/Download/patches/asitnt/QO00945.html", "refsource": "MISC", "url": "http://support.ca.com/Download/patches/asitnt/QO00945.html" }, { "name": "3343", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3343" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0960", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-01-31T00:00:00", "dateUpdated": "2024-08-08T04:37:07.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2001-09-15 04:00
Modified
2024-11-20 23:36
Severity ?
Summary
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 creates a hidden share named ARCSERVE$, which allows remote attackers to obtain sensitive information and overwrite critical files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
broadcom | arcserve_backup | 6.61 | |
broadcom | arcserve_backup_2000 | * | |
ca | arcserve_backup_2000 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:arcserve_backup:6.61:sp2a:*:*:*:*:*:*", "matchCriteriaId": "B72109C9-FEBA-446D-A55A-3912596F1F0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:arcserve_backup_2000:*:*:*:*:*:*:*:*", "matchCriteriaId": "56FD1727-784A-4DF2-9C58-A966DD54F48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_backup_2000:*:*:advanced:*:*:*:*:*", "matchCriteriaId": "2D05049E-B840-42FB-9FCF-F0F049973B89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 creates a hidden share named ARCSERVE$, which allows remote attackers to obtain sensitive information and overwrite critical files." } ], "id": "CVE-2001-0959", "lastModified": "2024-11-20T23:36:32.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-09-15T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://support.ca.com/Download/patches/asitnt/QO00945.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/5483" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3342" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://support.ca.com/Download/patches/asitnt/QO00945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/5483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-09-15 04:00
Modified
2024-11-20 23:36
Severity ?
Summary
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which allows local and remote attackers to gain privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
broadcom | arcserve_backup | 6.61 | |
broadcom | arcserve_backup_2000 | * | |
ca | arcserve_backup_2000 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:arcserve_backup:6.61:sp2a:*:*:*:*:*:*", "matchCriteriaId": "B72109C9-FEBA-446D-A55A-3912596F1F0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:arcserve_backup_2000:*:*:*:*:*:*:*:*", "matchCriteriaId": "56FD1727-784A-4DF2-9C58-A966DD54F48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_backup_2000:*:*:advanced:*:*:*:*:*", "matchCriteriaId": "2D05049E-B840-42FB-9FCF-F0F049973B89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which allows local and remote attackers to gain privileges." } ], "id": "CVE-2001-0960", "lastModified": "2024-11-20T23:36:32.257", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-09-15T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://support.ca.com/Download/patches/asitnt/QO00945.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3343" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://support.ca.com/Download/patches/asitnt/QO00945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-08-10 04:00
Modified
2024-11-20 23:59
Severity ?
Summary
Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*", "matchCriteriaId": "0F92699B-5BF2-4B6D-9E5A-79FC5419B48B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*", "matchCriteriaId": "3A0F8A34-6C29-409B-8F45-9CFA3F3D476C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*", "matchCriteriaId": "A0A0939D-F6B0-419B-834E-1A526425ED16", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*", "matchCriteriaId": "A740AFED-83A1-47DA-AEB4-EF89E9D0D216", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*", "matchCriteriaId": "F8EB5A1B-BAA2-46EB-84E2-E10983B1B39E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*", "matchCriteriaId": "3985E7FC-61E5-46CD-ACD5-BCA398668E09", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*", "matchCriteriaId": "AA3BE714-5F8A-4D72-B9C2-588966436F6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*", "matchCriteriaId": "35547C3F-7BF2-4DC0-9B8E-BF83473E6DD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*", "matchCriteriaId": "BC6305FE-E727-4B3E-9ABA-3A57CA4BDB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "09A830AF-2C6C-4FED-8470-FBC58749C8DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*", "matchCriteriaId": "D87CE17C-356A-44AB-84D8-789264B9724D", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*", "matchCriteriaId": "42C50C18-54D8-45AD-A4BA-313555A5BAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*", "matchCriteriaId": "A40F2EDB-2D61-4DFE-993E-220C3C420408", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*", "matchCriteriaId": "E927DA83-2F4A-4915-871D-B79D4B9A1FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*", "matchCriteriaId": "68CB2B8F-1915-41E5-9DC8-BC5F563C959D", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:*", "matchCriteriaId": "D4206807-8040-4F50-94E4-232482145F6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "937AD0E8-1FA8-4246-9CDD-5DBC902D2052", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*", "matchCriteriaId": "F7731D14-3789-43BB-846F-B430306E4876", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*", "matchCriteriaId": "721D1ABA-8F88-4390-BD84-F40F2DAC75A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*", "matchCriteriaId": "69AFA92B-1360-4EA3-A6C0-AE3BA5702965", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "78AA54EA-DAF1-4635-AA1B-E2E49C4BB597", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*", "matchCriteriaId": "061B6EAA-48D5-4937-801E-4A38E1B59F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*", "matchCriteriaId": "3644670B-9CC9-4772-A6F6-81B37FB632B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*", "matchCriteriaId": "C020DAC4-70B5-480D-BB4D-825E3FCB902C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*", "matchCriteriaId": "89DE1848-0A85-4B5C-8FAD-424DE9091A4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*", "matchCriteriaId": "D1257789-97D6-4D31-96BE-3A9073D98A73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260." } ], "id": "CVE-2005-2535", "lastModified": "2024-11-20T23:59:46.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-10T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0141.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0201.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/14293" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/966880" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/13814" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12536" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?ID=32478" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0141.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-02/0201.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/14293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/966880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/13814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?ID=32478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19320" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }