CVE-2006-5143

CVSS V2 High 7.5 CVSS V3 None
Description
Multiple buffer overflows in CA BrightStor ARCserve Backup r11.5 SP1 and earlier, r11.1, and 9.01; BrightStor ARCserve Backup for Windows r11; BrightStor Enterprise Backup 10.5; Server Protection Suite r2; and Business Protection Suite r2 allow remote attackers to execute arbitrary code via crafted data on TCP port 6071 to the Backup Agent RPC Server (DBASVR.exe) using the RPC routines with opcode (1) 0x01, (2) 0x02, or (3) 0x18; invalid stub data on TCP port 6503 to the RPC routines with opcode (4) 0x2b or (5) 0x2d in ASCORE.dll in the Message Engine RPC Server (msgeng.exe); (6) a long hostname on TCP port 41523 to ASBRDCST.DLL in the Discovery Service (casdscsvc.exe); or unspecified vectors related to the (7) Job Engine Service.
Overview
  • CVE ID
  • CVE-2006-5143
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2006-10-10T04:06:00
  • Last Modified Date
  • 2021-04-09T18:54:02
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:broadcom:brightstor_arcserve_backup:*:sp1:*:*:*:*:*:* 1 OR 11.5
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
References
Reference URL Reference Tags
http://www.tippingpoint.com/security/advisories/TSRT-06-11.html Patch
http://www.zerodayinitiative.com/advisories/ZDI-06-030.html Patch Vendor Advisory
http://supportconnectw.ca.com/public/storage/infodocs/basbr-secnotice.asp Patch
http://www.zerodayinitiative.com/advisories/ZDI-06-031.html Vendor Advisory
http://www.securityfocus.com/bid/20365
http://securitytracker.com/id?1017003
http://securitytracker.com/id?1017004
http://securitytracker.com/id?1017005
http://securitytracker.com/id?1017006
http://www.lssec.com/advisories/LS-20060220.pdf
http://www.lssec.com/advisories/LS-20060313.pdf
http://www.lssec.com/advisories/LS-20060330.pdf
http://www3.ca.com/securityadvisor/blogs/posting.aspx?pid=93775&id=90744
http://www3.ca.com/securityadvisor/blogs/posting.aspx?pid=94397&id=90744
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34693
http://www.kb.cert.org/vuls/id/361792 US Government Resource
http://www.kb.cert.org/vuls/id/860048 US Government Resource
http://secunia.com/advisories/22285 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3930 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/29364
http://www.securityfocus.com/archive/1/447930/100/200/threaded
http://www.securityfocus.com/archive/1/447927/100/200/threaded
http://www.securityfocus.com/archive/1/447926/100/200/threaded
http://www.securityfocus.com/archive/1/447862/100/100/threaded
http://www.securityfocus.com/archive/1/447848/100/100/threaded
http://www.securityfocus.com/archive/1/447847/100/200/threaded
http://www.securityfocus.com/archive/1/447839/100/100/threaded
History
Created Old Value New Value Data Type Notes
2022-05-10 07:16:17 Added to TrackCVE