Vulnerabilites related to ca - unicenter_remote_control
cve-2006-0306
Vulnerability from cvelistv5
Published
2006-01-19 00:00
Modified
2024-08-07 16:34
Severity ?
EPSS score ?
Summary
The DM Primer (dmprimer.exe) in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops & Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption or application hang) via a large network packet, which causes a WSAEMESGSIZE error code that is not handled, leading to a thread exit.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/22529 | vdb-entry, x_refsource_OSVDB | |
http://www.designfolks.com.au/karma/DMPrimer/ | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/422381/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2006/0236 | vdb-entry, x_refsource_VUPEN | |
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756 | x_refsource_CONFIRM | |
http://secunia.com/advisories/18531 | third-party-advisory, x_refsource_SECUNIA | |
http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/16276 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1015504 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:34:13.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "22529", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22529" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.designfolks.com.au/karma/DMPrimer/" }, { "name": "20060118 CAID 33756 - DM Deployment Common Component Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded" }, { "name": "ADV-2006-0236", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0236" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756" }, { "name": "18531", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp" }, { "name": "16276", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16276" }, { "name": "1015504", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015504" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The DM Primer (dmprimer.exe) in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops \u0026 Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption or application hang) via a large network packet, which causes a WSAEMESGSIZE error code that is not handled, leading to a thread exit." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "22529", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22529" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.designfolks.com.au/karma/DMPrimer/" }, { "name": "20060118 CAID 33756 - DM Deployment Common Component Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded" }, { "name": "ADV-2006-0236", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0236" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756" }, { "name": "18531", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp" }, { "name": "16276", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16276" }, { "name": "1015504", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015504" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DM Primer (dmprimer.exe) in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops \u0026 Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption or application hang) via a large network packet, which causes a WSAEMESGSIZE error code that is not handled, leading to a thread exit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "22529", "refsource": "OSVDB", "url": "http://www.osvdb.org/22529" }, { "name": "http://www.designfolks.com.au/karma/DMPrimer/", "refsource": "MISC", "url": "http://www.designfolks.com.au/karma/DMPrimer/" }, { "name": "20060118 CAID 33756 - DM Deployment Common Component Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded" }, { "name": "ADV-2006-0236", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0236" }, { "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756", "refsource": "CONFIRM", "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756" }, { "name": "18531", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18531" }, { "name": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp" }, { "name": "16276", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16276" }, { "name": "1015504", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015504" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0306", "datePublished": "2006-01-19T00:00:00", "dateReserved": "2006-01-18T00:00:00", "dateUpdated": "2024-08-07T16:34:13.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-0307
Vulnerability from cvelistv5
Published
2006-01-19 00:00
Modified
2024-08-07 16:34
Severity ?
EPSS score ?
Summary
The DM Primer in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops & Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption and log file consumption) via unspecified "unrecognized network messages" that are not properly handled.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/22529 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/archive/1/422381/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2006/0236 | vdb-entry, x_refsource_VUPEN | |
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756 | x_refsource_CONFIRM | |
http://secunia.com/advisories/18531 | third-party-advisory, x_refsource_SECUNIA | |
http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/16276 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1015504 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:34:13.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "22529", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22529" }, { "name": "20060118 CAID 33756 - DM Deployment Common Component Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded" }, { "name": "ADV-2006-0236", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0236" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756" }, { "name": "18531", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp" }, { "name": "16276", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16276" }, { "name": "1015504", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015504" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The DM Primer in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops \u0026 Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption and log file consumption) via unspecified \"unrecognized network messages\" that are not properly handled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "22529", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22529" }, { "name": "20060118 CAID 33756 - DM Deployment Common Component Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded" }, { "name": "ADV-2006-0236", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0236" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756" }, { "name": "18531", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp" }, { "name": "16276", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16276" }, { "name": "1015504", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015504" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DM Primer in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops \u0026 Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption and log file consumption) via unspecified \"unrecognized network messages\" that are not properly handled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "22529", "refsource": "OSVDB", "url": "http://www.osvdb.org/22529" }, { "name": "20060118 CAID 33756 - DM Deployment Common Component Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded" }, { "name": "ADV-2006-0236", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0236" }, { "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756", "refsource": "CONFIRM", "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756" }, { "name": "18531", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18531" }, { "name": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp" }, { "name": "16276", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16276" }, { "name": "1015504", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015504" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0307", "datePublished": "2006-01-19T00:00:00", "dateReserved": "2006-01-18T00:00:00", "dateUpdated": "2024-08-07T16:34:13.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2006-01-19 00:03
Modified
2024-11-21 00:06
Severity ?
Summary
The DM Primer in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops & Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption and log file consumption) via unspecified "unrecognized network messages" that are not properly handled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
broadcom | brightstor_arcserve_backup_laptops_desktops | 11.0 | |
broadcom | brightstor_arcserve_backup_laptops_desktops | 11.1 | |
broadcom | brightstor_arcserve_backup_laptops_desktops | 11.1 | |
broadcom | brightstor_mobile_backup | r4.0 | |
broadcom | business_protection_suite | 2.0 | |
broadcom | desktop_protection_suite | 2.0 | |
broadcom | server_protection_suite | 2 | |
broadcom | unicenter_remote_control | 5.2 | |
broadcom | unicenter_remote_control | 6.0 | |
broadcom | unicenter_remote_control | 6.0 | |
ca | unicenter_remote_control | 6.0 | |
ca | unicenter_remote_control | 6.0 | |
ca | unicenter_remote_control | 6.0_build_6.0.56.3 | |
ca | unicenter_remote_control | 6.0_build_6.0.74 | |
ca | unicenter_remote_control | 6.0_build_6.0.74 | |
ca | unicenter_remote_control | 6.0_build_6.0.74 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "4FB993B2-9A44-40E2-AA05-0CAD04BDC26D", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7461AE5-2067-4964-93B7-560CD02CEAC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "9DAE8E8B-7FD6-43CB-B07A-6D3B31E94DC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_mobile_backup:r4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9448EC1-7527-4CF9-85FC-26F61714E4B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "328E1C42-488A-43FC-8DF2-758DC73B74AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:desktop_protection_suite:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB698F99-FC87-4D59-9E01-3CE7A57FE0E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*", "matchCriteriaId": "A8781759-7B4C-47C3-8A60-8CA5520360C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "B43CE892-50CB-429F-B986-6FD4398A1D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "53C2C33D-8403-4C75-8A52-713393FE408F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D293FB82-D21B-4BDD-A511-B994B557032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0:sp1:*:en:*:*:*:*", "matchCriteriaId": "63788A55-F137-4F8A-8FDD-9C0B9881DE1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0:sp1:*:fr:*:*:*:*", "matchCriteriaId": "D9AB86C1-ABE7-4DB1-A050-2E54607BF3C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.56.3:*:*:en:*:*:*:*", "matchCriteriaId": "8E01F0FB-C836-4B25-9B40-6D0EEDEDFA74", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.74:*:*:de:*:*:*:*", "matchCriteriaId": "C45E9E3A-68D4-46D3-8A56-A07A76F4F7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.74:*:*:en:*:*:*:*", "matchCriteriaId": "1B36DAA2-B8F5-43A6-B407-5FF718383D4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.74:*:*:fr:*:*:*:*", "matchCriteriaId": "C7F41317-348B-4DD7-917C-46C6E2857E50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DM Primer in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops \u0026 Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption and log file consumption) via unspecified \"unrecognized network messages\" that are not properly handled." } ], "id": "CVE-2006-0307", "lastModified": "2024-11-21T00:06:09.590", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-19T00:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18531" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015504" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22529" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/16276" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/0236" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/16276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/0236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-01-19 00:03
Modified
2024-11-21 00:06
Severity ?
Summary
The DM Primer (dmprimer.exe) in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops & Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption or application hang) via a large network packet, which causes a WSAEMESGSIZE error code that is not handled, leading to a thread exit.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
broadcom | brightstor_arcserve_backup_laptops_desktops | 11.0 | |
broadcom | brightstor_arcserve_backup_laptops_desktops | 11.1 | |
broadcom | brightstor_arcserve_backup_laptops_desktops | 11.1 | |
broadcom | brightstor_mobile_backup | r4.0 | |
broadcom | business_protection_suite | 2.0 | |
broadcom | desktop_protection_suite | 2.0 | |
broadcom | server_protection_suite | 2 | |
broadcom | unicenter_remote_control | 5.2 | |
broadcom | unicenter_remote_control | 6.0 | |
broadcom | unicenter_remote_control | 6.0 | |
ca | unicenter_remote_control | 6.0 | |
ca | unicenter_remote_control | 6.0 | |
ca | unicenter_remote_control | 6.0_build_6.0.56.3 | |
ca | unicenter_remote_control | 6.0_build_6.0.74 | |
ca | unicenter_remote_control | 6.0_build_6.0.74 | |
ca | unicenter_remote_control | 6.0_build_6.0.74 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "4FB993B2-9A44-40E2-AA05-0CAD04BDC26D", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7461AE5-2067-4964-93B7-560CD02CEAC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "9DAE8E8B-7FD6-43CB-B07A-6D3B31E94DC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_mobile_backup:r4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9448EC1-7527-4CF9-85FC-26F61714E4B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "328E1C42-488A-43FC-8DF2-758DC73B74AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:desktop_protection_suite:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB698F99-FC87-4D59-9E01-3CE7A57FE0E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*", "matchCriteriaId": "A8781759-7B4C-47C3-8A60-8CA5520360C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "B43CE892-50CB-429F-B986-6FD4398A1D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "53C2C33D-8403-4C75-8A52-713393FE408F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D293FB82-D21B-4BDD-A511-B994B557032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0:sp1:*:en:*:*:*:*", "matchCriteriaId": "63788A55-F137-4F8A-8FDD-9C0B9881DE1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0:sp1:*:fr:*:*:*:*", "matchCriteriaId": "D9AB86C1-ABE7-4DB1-A050-2E54607BF3C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.56.3:*:*:en:*:*:*:*", "matchCriteriaId": "8E01F0FB-C836-4B25-9B40-6D0EEDEDFA74", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.74:*:*:de:*:*:*:*", "matchCriteriaId": "C45E9E3A-68D4-46D3-8A56-A07A76F4F7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.74:*:*:en:*:*:*:*", "matchCriteriaId": "1B36DAA2-B8F5-43A6-B407-5FF718383D4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_remote_control:6.0_build_6.0.74:*:*:fr:*:*:*:*", "matchCriteriaId": "C7F41317-348B-4DD7-917C-46C6E2857E50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DM Primer (dmprimer.exe) in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops \u0026 Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption or application hang) via a large network packet, which causes a WSAEMESGSIZE error code that is not handled, leading to a thread exit." } ], "id": "CVE-2006-0306", "lastModified": "2024-11-21T00:06:09.423", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-19T00:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18531" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015504" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory", "URL Repurposed" ], "url": "http://www.designfolks.com.au/karma/DMPrimer/" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22529" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/16276" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/0236" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/dmdeploysecurity_notice.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory", "URL Repurposed" ], "url": "http://www.designfolks.com.au/karma/DMPrimer/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/16276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/0236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33756" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }