cve-2007-0816
Vulnerability from cvelistv5
Published
2007-02-07 11:00
Modified
2024-08-07 12:34
Severity ?
EPSS score ?
Summary
The RPC Server service (catirpc.exe) in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 SP2 and earlier allows remote attackers to cause a denial of service (service crash) via a crafted TADDR2UADDR that triggers a null pointer dereference in catirpc.dll, possibly related to null credentials or verifier fields.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:34:20.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "24512", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24512" }, { "name": "32989", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/32989" }, { "name": "ADV-2007-0461", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0461" }, { "name": "brightstor-catirpc-dos(32137)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32137" }, { "name": "22365", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22365" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35058" }, { "name": "3248", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/3248" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317" }, { "name": "24009", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24009" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The RPC Server service (catirpc.exe) in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 SP2 and earlier allows remote attackers to cause a denial of service (service crash) via a crafted TADDR2UADDR that triggers a null pointer dereference in catirpc.dll, possibly related to null credentials or verifier fields." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "24512", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24512" }, { "name": "32989", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/32989" }, { "name": "ADV-2007-0461", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0461" }, { "name": "brightstor-catirpc-dos(32137)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32137" }, { "name": "22365", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22365" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35058" }, { "name": "3248", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/3248" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317" }, { "name": "24009", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24009" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0816", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The RPC Server service (catirpc.exe) in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 SP2 and earlier allows remote attackers to cause a denial of service (service crash) via a crafted TADDR2UADDR that triggers a null pointer dereference in catirpc.dll, possibly related to null credentials or verifier fields." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "24512", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24512" }, { "name": "32989", "refsource": "OSVDB", "url": "http://osvdb.org/32989" }, { "name": "ADV-2007-0461", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0461" }, { "name": "brightstor-catirpc-dos(32137)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32137" }, { "name": "22365", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22365" }, { "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35058", "refsource": "CONFIRM", "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35058" }, { "name": "3248", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/3248" }, { "name": "http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317", "refsource": "CONFIRM", "url": "http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317" }, { "name": "24009", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24009" }, { "name": "http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0816", "datePublished": "2007-02-07T11:00:00", "dateReserved": "2007-02-07T00:00:00", "dateUpdated": "2024-08-07T12:34:20.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C339825-77F9-478A-B1F7-A297D5715396\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E37161BE-6AF5-40E0-BD63-2C17431D8B36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"477EE032-D183-478F-A2BF-6165277A7414\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4305BA3B-B302-48EA-A923-EEC762DA42ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C689BA77-8B88-4742-9AF1-567E12B92E17\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The RPC Server service (catirpc.exe) in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 SP2 and earlier allows remote attackers to cause a denial of service (service crash) via a crafted TADDR2UADDR that triggers a null pointer dereference in catirpc.dll, possibly related to null credentials or verifier fields.\"}, {\"lang\": \"es\", \"value\": \"El servicio RPC Server (catirpc.exe) en CA (anteriormente Computer Associates) BrightStor ARCserve Backup versi\\u00f3n 11.5 SP2 y anteriores, permite a atacantes remotos causar una denegaci\\u00f3n de servicio (bloqueo del servicio) por medio de un TADDR2UADDR dise\\u00f1ado que desencadena una desreferencia del puntero null en biblioteca catirpc.dll, posiblemente relacionada con credenciales nulas o campos de comprobaci\\u00f3n.\"}]", "id": "CVE-2007-0816", "lastModified": "2024-11-21T00:26:48.833", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2007-02-07T11:28:00.000", "references": "[{\"url\": \"http://osvdb.org/32989\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/24009\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/24512\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/22365\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/0461\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35058\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/32137\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.exploit-db.com/exploits/3248\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/32989\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/24009\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/24512\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/22365\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/0461\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35058\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/32137\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.exploit-db.com/exploits/3248\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2007-0816\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-02-07T11:28:00.000\",\"lastModified\":\"2024-11-21T00:26:48.833\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The RPC Server service (catirpc.exe) in CA (formerly Computer Associates) BrightStor ARCserve Backup 11.5 SP2 and earlier allows remote attackers to cause a denial of service (service crash) via a crafted TADDR2UADDR that triggers a null pointer dereference in catirpc.dll, possibly related to null credentials or verifier fields.\"},{\"lang\":\"es\",\"value\":\"El servicio RPC Server (catirpc.exe) en CA (anteriormente Computer Associates) BrightStor ARCserve Backup versi\u00f3n 11.5 SP2 y anteriores, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del servicio) por medio de un TADDR2UADDR dise\u00f1ado que desencadena una desreferencia del puntero null en biblioteca catirpc.dll, posiblemente relacionada con credenciales nulas o campos de comprobaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C339825-77F9-478A-B1F7-A297D5715396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E37161BE-6AF5-40E0-BD63-2C17431D8B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"477EE032-D183-478F-A2BF-6165277A7414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4305BA3B-B302-48EA-A923-EEC762DA42ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C689BA77-8B88-4742-9AF1-567E12B92E17\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/32989\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24009\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24512\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/22365\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0461\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35058\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/32137\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/3248\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/32989\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24009\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24512\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://supportconnectw.ca.com/public/storage/infodocs/babtapeng-securitynotice.asp\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/22365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0461\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=101317\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=35058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/32137\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/3248\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.