Vulnerabilites related to computer_associates - desktop_management_suite
cve-2008-1328
Vulnerability from cvelistv5
Published
2008-04-07 18:00
Modified
2024-08-07 08:17
Severity ?
Summary
Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified "command arguments."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.193Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105"
          },
          {
            "name": "ca-arcservebackup-lgserverservice-bo(41641)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41641"
          },
          {
            "name": "3800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3800"
          },
          {
            "name": "28616",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28616"
          },
          {
            "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded"
          },
          {
            "name": "1019788",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019788"
          },
          {
            "name": "ADV-2008-1104",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1104/references"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified \"command arguments.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105"
        },
        {
          "name": "ca-arcservebackup-lgserverservice-bo(41641)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41641"
        },
        {
          "name": "3800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3800"
        },
        {
          "name": "28616",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28616"
        },
        {
          "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded"
        },
        {
          "name": "1019788",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019788"
        },
        {
          "name": "ADV-2008-1104",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1104/references"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1328",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified \"command arguments.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105",
              "refsource": "CONFIRM",
              "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105"
            },
            {
              "name": "ca-arcservebackup-lgserverservice-bo(41641)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41641"
            },
            {
              "name": "3800",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3800"
            },
            {
              "name": "28616",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28616"
            },
            {
              "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded"
            },
            {
              "name": "1019788",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019788"
            },
            {
              "name": "ADV-2008-1104",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1104/references"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1328",
    "datePublished": "2008-04-07T18:00:00",
    "dateReserved": "2008-03-13T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.193Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-1472
Vulnerability from cvelistv5
Published
2008-03-24 22:00
Modified
2024-08-07 08:24
Severity ?
Summary
Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:24:42.123Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "28268",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28268"
          },
          {
            "name": "ADV-2008-0902",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0902/references"
          },
          {
            "name": "29408",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29408"
          },
          {
            "name": "5264",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5264"
          },
          {
            "name": "ca-arcserve-listctrl-bo(41225)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225"
          },
          {
            "name": "20080320 Note about recently publicized CA BrightStor ActiveX exploit code",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded"
          },
          {
            "name": "1019617",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019617"
          },
          {
            "name": "20080328 CA Multiple Products DSM ListCtrl ActiveX Control Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "28268",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28268"
        },
        {
          "name": "ADV-2008-0902",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0902/references"
        },
        {
          "name": "29408",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29408"
        },
        {
          "name": "5264",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5264"
        },
        {
          "name": "ca-arcserve-listctrl-bo(41225)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225"
        },
        {
          "name": "20080320 Note about recently publicized CA BrightStor ActiveX exploit code",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded"
        },
        {
          "name": "1019617",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019617"
        },
        {
          "name": "20080328 CA Multiple Products DSM ListCtrl ActiveX Control Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1472",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "28268",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28268"
            },
            {
              "name": "ADV-2008-0902",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0902/references"
            },
            {
              "name": "29408",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29408"
            },
            {
              "name": "5264",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5264"
            },
            {
              "name": "ca-arcserve-listctrl-bo(41225)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225"
            },
            {
              "name": "20080320 Note about recently publicized CA BrightStor ActiveX exploit code",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded"
            },
            {
              "name": "1019617",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019617"
            },
            {
              "name": "20080328 CA Multiple Products DSM ListCtrl ActiveX Control Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded"
            },
            {
              "name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx",
              "refsource": "CONFIRM",
              "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1472",
    "datePublished": "2008-03-24T22:00:00",
    "dateReserved": "2008-03-24T00:00:00",
    "dateUpdated": "2024-08-07T08:24:42.123Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-1329
Vulnerability from cvelistv5
Published
2008-04-07 18:00
Modified
2024-08-07 08:17
Severity ?
Summary
Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to "insufficient verification of file uploads."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.502Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105"
          },
          {
            "name": "ca-arcserverbackup-netbackup-code-execution(41642)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41642"
          },
          {
            "name": "3800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3800"
          },
          {
            "name": "28616",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28616"
          },
          {
            "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded"
          },
          {
            "name": "1019788",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019788"
          },
          {
            "name": "ADV-2008-1104",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1104/references"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to \"insufficient verification of file uploads.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105"
        },
        {
          "name": "ca-arcserverbackup-netbackup-code-execution(41642)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41642"
        },
        {
          "name": "3800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3800"
        },
        {
          "name": "28616",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28616"
        },
        {
          "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded"
        },
        {
          "name": "1019788",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019788"
        },
        {
          "name": "ADV-2008-1104",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1104/references"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1329",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to \"insufficient verification of file uploads.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105",
              "refsource": "CONFIRM",
              "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105"
            },
            {
              "name": "ca-arcserverbackup-netbackup-code-execution(41642)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41642"
            },
            {
              "name": "3800",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3800"
            },
            {
              "name": "28616",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28616"
            },
            {
              "name": "20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded"
            },
            {
              "name": "1019788",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019788"
            },
            {
              "name": "ADV-2008-1104",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1104/references"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1329",
    "datePublished": "2008-04-07T18:00:00",
    "dateReserved": "2008-03-13T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.502Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-1786
Vulnerability from cvelistv5
Published
2008-04-16 17:00
Modified
2024-08-07 08:32
Severity ?
Summary
The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:32:01.307Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ca-dsmguicmctrls-code-execution(41853)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41853"
          },
          {
            "name": "VU#684883",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/684883"
          },
          {
            "name": "29837",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29837"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256"
          },
          {
            "name": "20080416 CA DSM gui_cm_ctrls ActiveX Control Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/490959/100/0/threaded"
          },
          {
            "name": "ADV-2008-1249",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1249/references"
          },
          {
            "name": "28809",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28809"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx"
          },
          {
            "name": "1019872",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019872"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ca-dsmguicmctrls-code-execution(41853)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41853"
        },
        {
          "name": "VU#684883",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/684883"
        },
        {
          "name": "29837",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29837"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256"
        },
        {
          "name": "20080416 CA DSM gui_cm_ctrls ActiveX Control Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/490959/100/0/threaded"
        },
        {
          "name": "ADV-2008-1249",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1249/references"
        },
        {
          "name": "28809",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28809"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx"
        },
        {
          "name": "1019872",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019872"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1786",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ca-dsmguicmctrls-code-execution(41853)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41853"
            },
            {
              "name": "VU#684883",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/684883"
            },
            {
              "name": "29837",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29837"
            },
            {
              "name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256",
              "refsource": "CONFIRM",
              "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256"
            },
            {
              "name": "20080416 CA DSM gui_cm_ctrls ActiveX Control Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/490959/100/0/threaded"
            },
            {
              "name": "ADV-2008-1249",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1249/references"
            },
            {
              "name": "28809",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28809"
            },
            {
              "name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx",
              "refsource": "CONFIRM",
              "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx"
            },
            {
              "name": "1019872",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019872"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1786",
    "datePublished": "2008-04-16T17:00:00",
    "dateReserved": "2008-04-15T00:00:00",
    "dateUpdated": "2024-08-07T08:32:01.307Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2008-04-16 17:05
Modified
2024-11-21 00:45
Severity ?
Summary
The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments.
References
cve@mitre.orghttp://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspxPatch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29837Vendor Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/684883US Government Resource
cve@mitre.orghttp://www.securityfocus.com/archive/1/490959/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/28809Patch
cve@mitre.orghttp://www.securitytracker.com/id?1019872
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1249/referencesVendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41853
cve@mitre.orghttps://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspxPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29837Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/684883US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/490959/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28809Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019872
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1249/referencesVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41853
af854a3a-2127-422b-91ae-364da2661108https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256Patch, Vendor Advisory
Impacted products
Vendor Product Version
computer_associates arcserve_backup_laptops_and_desktops r11.5
computer_associates desktop_and_server_management r11.1
computer_associates desktop_and_server_management r11.2
computer_associates desktop_and_server_management r11.2a
computer_associates desktop_and_server_management r11.2c1
computer_associates desktop_and_server_management r11.2c2
computer_associates desktop_management_suite r11.2
computer_associates desktop_management_suite r11.2a
computer_associates desktop_management_suite r11.2c1
computer_associates desktop_management_suite r11.2c2
computer_associates unicenter_asset_management r11.1
computer_associates unicenter_asset_management r11.2
computer_associates unicenter_asset_management r11.2a
computer_associates unicenter_asset_management r11.2c1
computer_associates unicenter_asset_management r11.2c2
computer_associates unicenter_desktop_management_bundle r11.1
computer_associates unicenter_desktop_management_bundle r11.2
computer_associates unicenter_desktop_management_bundle r11.2a
computer_associates unicenter_desktop_management_bundle r11.2c1
computer_associates unicenter_desktop_management_bundle r11.2c2
computer_associates unicenter_remote_control r11.1
computer_associates unicenter_remote_control r11.2
computer_associates unicenter_remote_control r11.2a
computer_associates unicenter_remote_control r11.2c1
computer_associates unicenter_remote_control r11.2c2
computer_associates unicenter_software_delivery r11.1
computer_associates unicenter_software_delivery r11.2
computer_associates unicenter_software_delivery r11.2a
computer_associates unicenter_software_delivery r11.2c1
computer_associates unicenter_software_delivery r11.2c2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "06109720-7926-4FC2-929B-0F16B1831739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_and_server_management:r11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A9801DB-E3D2-4314-B48B-8F127D4C6F48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C32D19ED-1EF0-4B66-8130-DA801BE7F34B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "943AFBAF-83DC-4A3B-B2E1-ACE6FF49F1E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2c1:*:*:*:*:*:*:*",
              "matchCriteriaId": "136D746D-573D-49AC-BD5C-5900021E276E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2c2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B72C35-13CA-4709-852E-929929FA1B27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEBE5366-CEDA-4CF2-9625-13E9D9E93B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E406D9-A850-4583-8A00-54DA578F6EB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2c1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C126FF95-7341-4B14-88B9-38163D98DF1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2c2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58E3FBB-B807-4D15-8D73-94496B0749AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_asset_management:r11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "404081A2-644D-4F4A-9BEE-6EE3A7BB2BC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "24503C4D-24BF-4EF3-A2F7-41958D02C7A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "04A5D3AF-997D-4F7E-B12E-442B42D38145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2c1:*:*:*:*:*:*:*",
              "matchCriteriaId": "809DB7E2-023F-491E-933F-3C47197EF2B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2c2:*:*:*:*:*:*:*",
              "matchCriteriaId": "37B1BD20-8F53-462E-A0B2-53185C49D63A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC37EE01-FEAA-418B-B2D0-8793E823D9DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "229BB2F0-BA44-423B-B232-3B50C55F2E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3833EBA-F8CC-4E39-92D5-20EA31F5DF9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2c1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9539E19-223C-4AA3-ADC8-F3606336816B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2c2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FFEBDA7-6A58-4E3B-B58B-424BD7E07C64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_remote_control:r11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F192DA2C-FAEC-4D77-A32C-7513EA053305",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "757EFDA2-F229-461C-9256-1A7F31A2AC27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4C36FD1-EFC8-446D-B32B-6DCA094DCCA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2c1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44782D0F-435C-43DB-AEE8-4926803A530E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2c2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1947D61C-B414-437B-99FF-B1D8627AAC5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B1ECC98-9A72-4E2C-81AD-35BE9700E589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEF6F1F5-3D50-4B45-A9D6-823771F32B9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1D0238-CE36-4F1B-BE87-3D15962D2DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2c1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7297A385-2C85-43E8-BFB0-F4B173B525FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2c2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FC3FF2E-1226-47E8-B5BE-B511A0EB9457",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments."
    },
    {
      "lang": "es",
      "value": "El control ActiveX DSM gui_cm_ctrls (archivo gui_cm_ctrls.ocx), tal y como es usado en distintos productos de CA, incluyendo a BrightStor ARCServe Backup for Laptops and Desktops versi\u00f3n r11.5, Desktop Management Suite versiones r11.1 hasta r11.2 C2; Unicenter versiones r11.1 hasta r11.2 C2; y Desktop and Server Management versiones r11.1 hasta r11.2 C2, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de argumentos de funci\u00f3n dise\u00f1ados."
    }
  ],
  "id": "CVE-2008-1786",
  "lastModified": "2024-11-21T00:45:19.607",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-04-16T17:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29837"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/684883"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/490959/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28809"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019872"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/1249/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41853"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29837"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/684883"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/490959/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28809"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/1249/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41853"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-24 22:44
Modified
2024-11-21 00:44
Severity ?
Summary
Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:computer_associates:brightstor_arcserve_backup_laptops_desktops:11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB967E4-2CE5-4283-A798-2C083AFB5B56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:a:*:*:*:*:*:*",
              "matchCriteriaId": "B8FAF118-7DCB-4F6E-8645-102ED226828B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:c1:*:*:*:*:*:*",
              "matchCriteriaId": "04E5D3CF-9015-4D84-A498-25120C4DDC4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:ga:*:*:*:*:*:*",
              "matchCriteriaId": "0BC9155B-394F-4DB0-ACEE-CFF62E03A44A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEBE5366-CEDA-4CF2-9625-13E9D9E93B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:unicenter_dsm_r11_list_control_atx:11.2.3.1895:*:*:*:*:*:*:*",
              "matchCriteriaId": "C68A1807-ED3A-4E7B-84BF-BB6AD0916174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:a:*:*:*:*:*:*",
              "matchCriteriaId": "21C1E9A1-00F4-4866-9899-D644BD1E6E65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:c1:*:*:*:*:*:*",
              "matchCriteriaId": "7A89E3C3-861F-41DE-B46C-776E4BDC6F16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:ga:*:*:*:*:*:*",
              "matchCriteriaId": "170FCD6A-792C-452D-97E3-FE9A354D95D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9F9C9B-CD0E-42B6-B654-EE9E16A93790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "EBD24EBE-2942-4A0D-9481-FEC5BE9C94C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:c1:*:*:*:*:*:*",
              "matchCriteriaId": "80486731-420B-4B2F-B2C3-B40E0C57ACFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:a:*:*:*:*:*:*",
              "matchCriteriaId": "D4E67182-4AC8-4094-AC4F-815E40AE82E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:c1:*:*:*:*:*:*",
              "matchCriteriaId": "E2A6834E-2E6C-4DC6-B8F7-BB3FE643BE5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:ga:*:*:*:*:*:*",
              "matchCriteriaId": "1D4976C0-DF5F-4A7E-AEC1-6C90E82F5047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C03C0146-12CF-437E-B13A-C13FC06EC0F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "C2FE92F0-0F01-455F-8A13-1FC8E65F2117",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:c1:*:*:*:*:*:*",
              "matchCriteriaId": "078BC506-4092-4FE4-8AD2-1DDD92848852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:a:*:*:*:*:*:*",
              "matchCriteriaId": "B1607DE7-0078-4BF3-8E28-59F1CBC7775A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:c1:*:*:*:*:*:*",
              "matchCriteriaId": "F0834E9C-2B65-4AB9-B4A7-410282967975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:ga:*:*:*:*:*:*",
              "matchCriteriaId": "71B90EAA-275B-4E9E-B254-C4EC8158939F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3338E5-87AC-4D7C-96EF-38A8B43D0060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "CCD51973-2876-44AD-8FC5-0469267E71C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:c1:*:*:*:*:*:*",
              "matchCriteriaId": "860B437B-5C99-421D-BAAE-56F583DAA532",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:a:*:*:*:*:*:*",
              "matchCriteriaId": "7AF37FA7-6556-49FC-B7C9-D5530BDA00D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:c1:*:*:*:*:*:*",
              "matchCriteriaId": "92EBC724-75AB-4201-AD97-1A05A7F46941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:ga:*:*:*:*:*:*",
              "matchCriteriaId": "50BCB284-7A16-4EAE-A8DF-9C432CD71490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "174BBEAB-EE21-4CBC-BE54-E51A4DD95D28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "57EC5134-D419-44A2-885C-72CB7724F0E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:c1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDB0DF2-6160-4059-B379-78E45B4E8D4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en el control ActiveX ListCtrl (ListCtrl.ocx), como es usado en varios productos de CA, incluyendo BrightStor ARCserve Backup versi\u00f3n R11.5, Desktop Management Suite versiones r11.1 hasta r11.2 y productos Unicenter versiones r11.1 hasta r11. 2, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (bloqueo) por medio de un argumento largo en el m\u00e9todo AddColumn."
    }
  ],
  "id": "CVE-2008-1472",
  "lastModified": "2024-11-21T00:44:37.243",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-24T22:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29408"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/28268"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019617"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0902/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5264"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/28268"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019617"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0902/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5264"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-04-07 18:44
Modified
2024-11-21 00:44
Severity ?
Summary
Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to "insufficient verification of file uploads."



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "22268F99-2F38-481D-A0CC-B1FC96FDB953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0C2CF0-C4FA-45EA-8CE7-A6F26E74A82B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FA31980-E04A-4C5C-AD81-BBD2DC925B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "D8FDE4F2-A3E1-4DE3-8800-8E6D58116134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "F14BBE21-4FB8-4E25-9437-DC215AE7C208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "06109720-7926-4FC2-929B-0F16B1831739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:11.2:*:english:*:*:*:*:*",
              "matchCriteriaId": "815D1724-8E39-4941-A546-16B15E3C51E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:11.2:*:localized:*:*:*:*:*",
              "matchCriteriaId": "BC2D63FF-149F-4F7A-9842-52E56818462A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to \"insufficient verification of file uploads.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada del servicio NetBackup de CA ARCserve Backup for Laptops and Desktops versiones de la r11.0 a la r11.5 y Suite 11.1 and 11.2, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n, relacionado con \u201csubidas de archivos sin suficiente verificacion\u201d"
    }
  ],
  "id": "CVE-2008-1329",
  "lastModified": "2024-11-21T00:44:16.990",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-04-07T18:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28616"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019788"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1104/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41642"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28616"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019788"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1104/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-04-07 18:44
Modified
2024-11-21 00:44
Severity ?
Summary
Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified "command arguments."



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "22268F99-2F38-481D-A0CC-B1FC96FDB953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0C2CF0-C4FA-45EA-8CE7-A6F26E74A82B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FA31980-E04A-4C5C-AD81-BBD2DC925B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "D8FDE4F2-A3E1-4DE3-8800-8E6D58116134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "F14BBE21-4FB8-4E25-9437-DC215AE7C208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "06109720-7926-4FC2-929B-0F16B1831739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:11.2:*:english:*:*:*:*:*",
              "matchCriteriaId": "815D1724-8E39-4941-A546-16B15E3C51E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:11.2:*:localized:*:*:*:*:*",
              "matchCriteriaId": "BC2D63FF-149F-4F7A-9842-52E56818462A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified \"command arguments.\""
    },
    {
      "lang": "es",
      "value": "Desbordamiento de B\u00fafer del Servicio LGServer de CA ARCserve Backup for Laptops and Desktops versiones de la r11.0 a la r11.5 y Suite 11.1 and 11.2, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos de comando no especificados."
    }
  ],
  "id": "CVE-2008-1328",
  "lastModified": "2024-11-21T00:44:16.853",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-04-07T18:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28616"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019788"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1104/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41641"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/490463/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28616"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019788"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1104/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41641"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}