CVE-2007-0673 (GCVE-0-2007-0673)
Vulnerability from cvelistv5 – Published: 2007-02-03 01:00 – Updated: 2024-08-07 12:26
VLAI?
Summary
LGSERVER.EXE in BrightStor ARCserve Backup for Laptops & Desktops r11.1 allows remote attackers to cause a denial of service (daemon crash) via a value of 0xFFFFFFFF at a certain point in an authentication negotiation packet, which results in an out-of-bounds read.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:26:54.281Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20070131 Remote DOS BrightStor ARCserve Backup for Laptops \u0026 Desktops",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/458650/100/0/threaded"
},
{
"name": "22337",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22337"
},
{
"name": "32948",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/32948"
},
{
"name": "2218",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/2218"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-01-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "LGSERVER.EXE in BrightStor ARCserve Backup for Laptops \u0026 Desktops r11.1 allows remote attackers to cause a denial of service (daemon crash) via a value of 0xFFFFFFFF at a certain point in an authentication negotiation packet, which results in an out-of-bounds read."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20070131 Remote DOS BrightStor ARCserve Backup for Laptops \u0026 Desktops",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/458650/100/0/threaded"
},
{
"name": "22337",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22337"
},
{
"name": "32948",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/32948"
},
{
"name": "2218",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/2218"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0673",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "LGSERVER.EXE in BrightStor ARCserve Backup for Laptops \u0026 Desktops r11.1 allows remote attackers to cause a denial of service (daemon crash) via a value of 0xFFFFFFFF at a certain point in an authentication negotiation packet, which results in an out-of-bounds read."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070131 Remote DOS BrightStor ARCserve Backup for Laptops \u0026 Desktops",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/458650/100/0/threaded"
},
{
"name": "22337",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22337"
},
{
"name": "32948",
"refsource": "OSVDB",
"url": "http://osvdb.org/32948"
},
{
"name": "2218",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2218"
},
{
"name": "http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp",
"refsource": "CONFIRM",
"url": "http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0673",
"datePublished": "2007-02-03T01:00:00",
"dateReserved": "2007-02-02T00:00:00",
"dateUpdated": "2024-08-07T12:26:54.281Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FB993B2-9A44-40E2-AA05-0CAD04BDC26D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7461AE5-2067-4964-93B7-560CD02CEAC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DAE8E8B-7FD6-43CB-B07A-6D3B31E94DC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"328E1C42-488A-43FC-8DF2-758DC73B74AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:desktop_management_suite:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"237F2346-0B9B-4CE8-8EF9-813CB3F1BC1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22268F99-2F38-481D-A0CC-B1FC96FDB953\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:desktop_protection_suite:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB698F99-FC87-4D59-9E01-3CE7A57FE0E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_sbs_premium:*:*:*:*:*\", \"matchCriteriaId\": \"2429EE00-5359-4C47-A634-8DBC57253266\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_sbs_standard:*:*:*:*:*\", \"matchCriteriaId\": \"F33EE596-0901-4A13-BAA1-1A7C7C16AD27\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"LGSERVER.EXE in BrightStor ARCserve Backup for Laptops \u0026 Desktops r11.1 allows remote attackers to cause a denial of service (daemon crash) via a value of 0xFFFFFFFF at a certain point in an authentication negotiation packet, which results in an out-of-bounds read.\"}, {\"lang\": \"es\", \"value\": \"El archivo LGSERVER.EXE en BrightStor ARCserve Backup para Ordenadores Port\\u00e1tiles y de Escritorio versi\\u00f3n r11.1 permite a los atacantes remotos causar una denegaci\\u00f3n de servicio (bloqueo del demonio) por medio de un valor de 0xFFFFFFFF en un determinado punto en un paquete de negociaci\\u00f3n de autenticaci\\u00f3n, resultando en una lectura fuera de l\\u00edmites.\"}]",
"id": "CVE-2007-0673",
"lastModified": "2024-11-21T00:26:27.607",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2007-02-03T01:28:00.000",
"references": "[{\"url\": \"http://osvdb.org/32948\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securityreason.com/securityalert/2218\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/458650/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/22337\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://osvdb.org/32948\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securityreason.com/securityalert/2218\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/458650/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/22337\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-0673\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-02-03T01:28:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"LGSERVER.EXE in BrightStor ARCserve Backup for Laptops \u0026 Desktops r11.1 allows remote attackers to cause a denial of service (daemon crash) via a value of 0xFFFFFFFF at a certain point in an authentication negotiation packet, which results in an out-of-bounds read.\"},{\"lang\":\"es\",\"value\":\"El archivo LGSERVER.EXE en BrightStor ARCserve Backup para Ordenadores Port\u00e1tiles y de Escritorio versi\u00f3n r11.1 permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio) por medio de un valor de 0xFFFFFFFF en un determinado punto en un paquete de negociaci\u00f3n de autenticaci\u00f3n, resultando en una lectura fuera de l\u00edmites.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FB993B2-9A44-40E2-AA05-0CAD04BDC26D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7461AE5-2067-4964-93B7-560CD02CEAC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DAE8E8B-7FD6-43CB-B07A-6D3B31E94DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"328E1C42-488A-43FC-8DF2-758DC73B74AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:desktop_management_suite:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237F2346-0B9B-4CE8-8EF9-813CB3F1BC1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22268F99-2F38-481D-A0CC-B1FC96FDB953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:desktop_protection_suite:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB698F99-FC87-4D59-9E01-3CE7A57FE0E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_sbs_premium:*:*:*:*:*\",\"matchCriteriaId\":\"2429EE00-5359-4C47-A634-8DBC57253266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_sbs_standard:*:*:*:*:*\",\"matchCriteriaId\":\"F33EE596-0901-4A13-BAA1-1A7C7C16AD27\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/32948\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/2218\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/archive/1/458650/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/22337\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://osvdb.org/32948\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/2218\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/babldimpsec-notice.asp\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/archive/1/458650/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/22337\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…