Vulnerabilites related to computer_associates - desktop_management_suite
cve-2008-1328
Vulnerability from cvelistv5
Published
2008-04-07 18:00
Modified
2024-08-07 08:17
Severity ?
EPSS score ?
Summary
Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified "command arguments."
References
▼ | URL | Tags |
---|---|---|
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41641 | vdb-entry, x_refsource_XF | |
http://securityreason.com/securityalert/3800 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/28616 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/490463/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1019788 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2008/1104/references | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" }, { "name": "ca-arcservebackup-lgserverservice-bo(41641)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41641" }, { "name": "3800", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3800" }, { "name": "28616", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28616" }, { "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded" }, { "name": "1019788", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019788" }, { "name": "ADV-2008-1104", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1104/references" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified \"command arguments.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" }, { "name": "ca-arcservebackup-lgserverservice-bo(41641)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41641" }, { "name": "3800", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3800" }, { "name": "28616", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28616" }, { "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded" }, { "name": "1019788", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019788" }, { "name": "ADV-2008-1104", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1104/references" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1328", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified \"command arguments.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105", "refsource": "CONFIRM", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" }, { "name": "ca-arcservebackup-lgserverservice-bo(41641)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41641" }, { "name": "3800", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3800" }, { "name": "28616", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28616" }, { "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded" }, { "name": "1019788", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019788" }, { "name": "ADV-2008-1104", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1104/references" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1328", "datePublished": "2008-04-07T18:00:00", "dateReserved": "2008-03-13T00:00:00", "dateUpdated": "2024-08-07T08:17:34.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1472
Vulnerability from cvelistv5
Published
2008-03-24 22:00
Modified
2024-08-07 08:24
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/28268 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2008/0902/references | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/29408 | third-party-advisory, x_refsource_SECUNIA | |
https://www.exploit-db.com/exploits/5264 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41225 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/489893/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1019617 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/490263/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:24:42.123Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28268", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28268" }, { "name": "ADV-2008-0902", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0902/references" }, { "name": "29408", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29408" }, { "name": "5264", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5264" }, { "name": "ca-arcserve-listctrl-bo(41225)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225" }, { "name": "20080320 Note about recently publicized CA BrightStor ActiveX exploit code", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded" }, { "name": "1019617", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019617" }, { "name": "20080328 CA Multiple Products DSM ListCtrl ActiveX Control Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28268", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28268" }, { "name": "ADV-2008-0902", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0902/references" }, { "name": "29408", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29408" }, { "name": "5264", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5264" }, { "name": "ca-arcserve-listctrl-bo(41225)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225" }, { "name": "20080320 Note about recently publicized CA BrightStor ActiveX exploit code", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded" }, { "name": "1019617", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019617" }, { "name": "20080328 CA Multiple Products DSM ListCtrl ActiveX Control Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1472", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28268", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28268" }, { "name": "ADV-2008-0902", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0902/references" }, { "name": "29408", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29408" }, { "name": "5264", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5264" }, { "name": "ca-arcserve-listctrl-bo(41225)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225" }, { "name": "20080320 Note about recently publicized CA BrightStor ActiveX exploit code", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded" }, { "name": "1019617", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019617" }, { "name": "20080328 CA Multiple Products DSM ListCtrl ActiveX Control Buffer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded" }, { "name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx", "refsource": "CONFIRM", "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1472", "datePublished": "2008-03-24T22:00:00", "dateReserved": "2008-03-24T00:00:00", "dateUpdated": "2024-08-07T08:24:42.123Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1329
Vulnerability from cvelistv5
Published
2008-04-07 18:00
Modified
2024-08-07 08:17
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to "insufficient verification of file uploads."
References
▼ | URL | Tags |
---|---|---|
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41642 | vdb-entry, x_refsource_XF | |
http://securityreason.com/securityalert/3800 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/28616 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/490463/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1019788 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2008/1104/references | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" }, { "name": "ca-arcserverbackup-netbackup-code-execution(41642)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41642" }, { "name": "3800", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3800" }, { "name": "28616", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28616" }, { "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded" }, { "name": "1019788", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019788" }, { "name": "ADV-2008-1104", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1104/references" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to \"insufficient verification of file uploads.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" }, { "name": "ca-arcserverbackup-netbackup-code-execution(41642)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41642" }, { "name": "3800", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3800" }, { "name": "28616", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28616" }, { "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded" }, { "name": "1019788", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019788" }, { "name": "ADV-2008-1104", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1104/references" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1329", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to \"insufficient verification of file uploads.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105", "refsource": "CONFIRM", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" }, { "name": "ca-arcserverbackup-netbackup-code-execution(41642)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41642" }, { "name": "3800", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3800" }, { "name": "28616", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28616" }, { "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded" }, { "name": "1019788", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019788" }, { "name": "ADV-2008-1104", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1104/references" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1329", "datePublished": "2008-04-07T18:00:00", "dateReserved": "2008-03-13T00:00:00", "dateUpdated": "2024-08-07T08:17:34.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1786
Vulnerability from cvelistv5
Published
2008-04-16 17:00
Modified
2024-08-07 08:32
Severity ?
EPSS score ?
Summary
The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/41853 | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/684883 | third-party-advisory, x_refsource_CERT-VN | |
http://secunia.com/advisories/29837 | third-party-advisory, x_refsource_SECUNIA | |
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256 | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/490959/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/1249/references | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/28809 | vdb-entry, x_refsource_BID | |
http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1019872 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:32:01.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ca-dsmguicmctrls-code-execution(41853)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41853" }, { "name": "VU#684883", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/684883" }, { "name": "29837", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29837" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256" }, { "name": "20080416 CA DSM gui_cm_ctrls ActiveX Control Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490959/100/0/threaded" }, { "name": "ADV-2008-1249", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1249/references" }, { "name": "28809", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28809" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx" }, { "name": "1019872", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019872" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ca-dsmguicmctrls-code-execution(41853)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41853" }, { "name": "VU#684883", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/684883" }, { "name": "29837", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29837" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256" }, { "name": "20080416 CA DSM gui_cm_ctrls ActiveX Control Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490959/100/0/threaded" }, { "name": "ADV-2008-1249", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1249/references" }, { "name": "28809", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28809" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx" }, { "name": "1019872", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019872" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1786", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ca-dsmguicmctrls-code-execution(41853)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41853" }, { "name": "VU#684883", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/684883" }, { "name": "29837", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29837" }, { "name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256", "refsource": "CONFIRM", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256" }, { "name": "20080416 CA DSM gui_cm_ctrls ActiveX Control Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/490959/100/0/threaded" }, { "name": "ADV-2008-1249", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1249/references" }, { "name": "28809", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28809" }, { "name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx", "refsource": "CONFIRM", "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx" }, { "name": "1019872", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019872" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1786", "datePublished": "2008-04-16T17:00:00", "dateReserved": "2008-04-15T00:00:00", "dateUpdated": "2024-08-07T08:32:01.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2008-04-16 17:05
Modified
2024-11-21 00:45
Severity ?
Summary
The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "06109720-7926-4FC2-929B-0F16B1831739", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_and_server_management:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A9801DB-E3D2-4314-B48B-8F127D4C6F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "C32D19ED-1EF0-4B66-8130-DA801BE7F34B", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2a:*:*:*:*:*:*:*", "matchCriteriaId": "943AFBAF-83DC-4A3B-B2E1-ACE6FF49F1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2c1:*:*:*:*:*:*:*", "matchCriteriaId": "136D746D-573D-49AC-BD5C-5900021E276E", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2c2:*:*:*:*:*:*:*", "matchCriteriaId": "33B72C35-13CA-4709-852E-929929FA1B27", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "CEBE5366-CEDA-4CF2-9625-13E9D9E93B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2a:*:*:*:*:*:*:*", "matchCriteriaId": "24E406D9-A850-4583-8A00-54DA578F6EB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2c1:*:*:*:*:*:*:*", "matchCriteriaId": "C126FF95-7341-4B14-88B9-38163D98DF1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2c2:*:*:*:*:*:*:*", "matchCriteriaId": "F58E3FBB-B807-4D15-8D73-94496B0749AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_asset_management:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "404081A2-644D-4F4A-9BEE-6EE3A7BB2BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "24503C4D-24BF-4EF3-A2F7-41958D02C7A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2a:*:*:*:*:*:*:*", "matchCriteriaId": "04A5D3AF-997D-4F7E-B12E-442B42D38145", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2c1:*:*:*:*:*:*:*", "matchCriteriaId": "809DB7E2-023F-491E-933F-3C47197EF2B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2c2:*:*:*:*:*:*:*", "matchCriteriaId": "37B1BD20-8F53-462E-A0B2-53185C49D63A", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC37EE01-FEAA-418B-B2D0-8793E823D9DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "229BB2F0-BA44-423B-B232-3B50C55F2E4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2a:*:*:*:*:*:*:*", "matchCriteriaId": "B3833EBA-F8CC-4E39-92D5-20EA31F5DF9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2c1:*:*:*:*:*:*:*", "matchCriteriaId": "E9539E19-223C-4AA3-ADC8-F3606336816B", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2c2:*:*:*:*:*:*:*", "matchCriteriaId": "3FFEBDA7-6A58-4E3B-B58B-424BD7E07C64", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_remote_control:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "F192DA2C-FAEC-4D77-A32C-7513EA053305", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "757EFDA2-F229-461C-9256-1A7F31A2AC27", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2a:*:*:*:*:*:*:*", "matchCriteriaId": "D4C36FD1-EFC8-446D-B32B-6DCA094DCCA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2c1:*:*:*:*:*:*:*", "matchCriteriaId": "44782D0F-435C-43DB-AEE8-4926803A530E", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2c2:*:*:*:*:*:*:*", "matchCriteriaId": "1947D61C-B414-437B-99FF-B1D8627AAC5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B1ECC98-9A72-4E2C-81AD-35BE9700E589", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "AEF6F1F5-3D50-4B45-A9D6-823771F32B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2a:*:*:*:*:*:*:*", "matchCriteriaId": "8E1D0238-CE36-4F1B-BE87-3D15962D2DE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2c1:*:*:*:*:*:*:*", "matchCriteriaId": "7297A385-2C85-43E8-BFB0-F4B173B525FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2c2:*:*:*:*:*:*:*", "matchCriteriaId": "8FC3FF2E-1226-47E8-B5BE-B511A0EB9457", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments." }, { "lang": "es", "value": "El control ActiveX DSM gui_cm_ctrls (archivo gui_cm_ctrls.ocx), tal y como es usado en distintos productos de CA, incluyendo a BrightStor ARCServe Backup for Laptops and Desktops versi\u00f3n r11.5, Desktop Management Suite versiones r11.1 hasta r11.2 C2; Unicenter versiones r11.1 hasta r11.2 C2; y Desktop and Server Management versiones r11.1 hasta r11.2 C2, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de argumentos de funci\u00f3n dise\u00f1ados." } ], "id": "CVE-2008-1786", "lastModified": "2024-11-21T00:45:19.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-04-16T17:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29837" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/684883" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/490959/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28809" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019872" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1249/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41853" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/684883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/490959/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28809" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1249/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-24 22:44
Modified
2024-11-21 00:44
Severity ?
Summary
Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:computer_associates:brightstor_arcserve_backup_laptops_desktops:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CB967E4-2CE5-4283-A798-2C083AFB5B56", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:a:*:*:*:*:*:*", "matchCriteriaId": "B8FAF118-7DCB-4F6E-8645-102ED226828B", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:c1:*:*:*:*:*:*", "matchCriteriaId": "04E5D3CF-9015-4D84-A498-25120C4DDC4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:ga:*:*:*:*:*:*", "matchCriteriaId": "0BC9155B-394F-4DB0-ACEE-CFF62E03A44A", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "CEBE5366-CEDA-4CF2-9625-13E9D9E93B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_dsm_r11_list_control_atx:11.2.3.1895:*:*:*:*:*:*:*", "matchCriteriaId": "C68A1807-ED3A-4E7B-84BF-BB6AD0916174", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:a:*:*:*:*:*:*", "matchCriteriaId": "21C1E9A1-00F4-4866-9899-D644BD1E6E65", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:c1:*:*:*:*:*:*", "matchCriteriaId": "7A89E3C3-861F-41DE-B46C-776E4BDC6F16", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:ga:*:*:*:*:*:*", "matchCriteriaId": "170FCD6A-792C-452D-97E3-FE9A354D95D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B9F9C9B-CD0E-42B6-B654-EE9E16A93790", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:a:*:*:*:*:*:*", "matchCriteriaId": "EBD24EBE-2942-4A0D-9481-FEC5BE9C94C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:c1:*:*:*:*:*:*", "matchCriteriaId": "80486731-420B-4B2F-B2C3-B40E0C57ACFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:a:*:*:*:*:*:*", "matchCriteriaId": "D4E67182-4AC8-4094-AC4F-815E40AE82E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:c1:*:*:*:*:*:*", "matchCriteriaId": "E2A6834E-2E6C-4DC6-B8F7-BB3FE643BE5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:ga:*:*:*:*:*:*", "matchCriteriaId": "1D4976C0-DF5F-4A7E-AEC1-6C90E82F5047", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "C03C0146-12CF-437E-B13A-C13FC06EC0F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:a:*:*:*:*:*:*", "matchCriteriaId": "C2FE92F0-0F01-455F-8A13-1FC8E65F2117", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:c1:*:*:*:*:*:*", "matchCriteriaId": "078BC506-4092-4FE4-8AD2-1DDD92848852", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:a:*:*:*:*:*:*", "matchCriteriaId": "B1607DE7-0078-4BF3-8E28-59F1CBC7775A", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:c1:*:*:*:*:*:*", "matchCriteriaId": "F0834E9C-2B65-4AB9-B4A7-410282967975", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:ga:*:*:*:*:*:*", "matchCriteriaId": "71B90EAA-275B-4E9E-B254-C4EC8158939F", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C3338E5-87AC-4D7C-96EF-38A8B43D0060", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:a:*:*:*:*:*:*", "matchCriteriaId": "CCD51973-2876-44AD-8FC5-0469267E71C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:c1:*:*:*:*:*:*", "matchCriteriaId": "860B437B-5C99-421D-BAAE-56F583DAA532", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:a:*:*:*:*:*:*", "matchCriteriaId": "7AF37FA7-6556-49FC-B7C9-D5530BDA00D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:c1:*:*:*:*:*:*", "matchCriteriaId": "92EBC724-75AB-4201-AD97-1A05A7F46941", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:ga:*:*:*:*:*:*", "matchCriteriaId": "50BCB284-7A16-4EAE-A8DF-9C432CD71490", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:*:*:*:*:*:*:*", "matchCriteriaId": "174BBEAB-EE21-4CBC-BE54-E51A4DD95D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:a:*:*:*:*:*:*", "matchCriteriaId": "57EC5134-D419-44A2-885C-72CB7724F0E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:c1:*:*:*:*:*:*", "matchCriteriaId": "4CDB0DF2-6160-4059-B379-78E45B4E8D4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en el control ActiveX ListCtrl (ListCtrl.ocx), como es usado en varios productos de CA, incluyendo BrightStor ARCserve Backup versi\u00f3n R11.5, Desktop Management Suite versiones r11.1 hasta r11.2 y productos Unicenter versiones r11.1 hasta r11. 2, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (bloqueo) por medio de un argumento largo en el m\u00e9todo AddColumn." } ], "id": "CVE-2008-1472", "lastModified": "2024-11-21T00:44:37.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-03-24T22:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29408" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28268" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019617" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0902/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0902/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5264" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-04-07 18:44
Modified
2024-11-21 00:44
Severity ?
Summary
Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to "insufficient verification of file uploads."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "22268F99-2F38-481D-A0CC-B1FC96FDB953", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F0C2CF0-C4FA-45EA-8CE7-A6F26E74A82B", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FA31980-E04A-4C5C-AD81-BBD2DC925B1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "D8FDE4F2-A3E1-4DE3-8800-8E6D58116134", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "F14BBE21-4FB8-4E25-9437-DC215AE7C208", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "06109720-7926-4FC2-929B-0F16B1831739", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:11.2:*:english:*:*:*:*:*", "matchCriteriaId": "815D1724-8E39-4941-A546-16B15E3C51E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:11.2:*:localized:*:*:*:*:*", "matchCriteriaId": "BC2D63FF-149F-4F7A-9842-52E56818462A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to \"insufficient verification of file uploads.\"" }, { "lang": "es", "value": "Vulnerabilidad no especificada del servicio NetBackup de CA ARCserve Backup for Laptops and Desktops versiones de la r11.0 a la r11.5 y Suite 11.1 and 11.2, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n, relacionado con \u201csubidas de archivos sin suficiente verificacion\u201d" } ], "id": "CVE-2008-1329", "lastModified": "2024-11-21T00:44:16.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-07T18:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3800" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28616" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019788" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1104/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41642" }, { "source": "cve@mitre.org", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1104/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-04-07 18:44
Modified
2024-11-21 00:44
Severity ?
Summary
Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified "command arguments."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "22268F99-2F38-481D-A0CC-B1FC96FDB953", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F0C2CF0-C4FA-45EA-8CE7-A6F26E74A82B", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FA31980-E04A-4C5C-AD81-BBD2DC925B1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "D8FDE4F2-A3E1-4DE3-8800-8E6D58116134", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "F14BBE21-4FB8-4E25-9437-DC215AE7C208", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "06109720-7926-4FC2-929B-0F16B1831739", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:11.2:*:english:*:*:*:*:*", "matchCriteriaId": "815D1724-8E39-4941-A546-16B15E3C51E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:11.2:*:localized:*:*:*:*:*", "matchCriteriaId": "BC2D63FF-149F-4F7A-9842-52E56818462A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified \"command arguments.\"" }, { "lang": "es", "value": "Desbordamiento de B\u00fafer del Servicio LGServer de CA ARCserve Backup for Laptops and Desktops versiones de la r11.0 a la r11.5 y Suite 11.1 and 11.2, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos de comando no especificados." } ], "id": "CVE-2008-1328", "lastModified": "2024-11-21T00:44:16.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-07T18:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3800" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28616" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019788" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1104/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41641" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1104/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }