Vulnerabilities > CVE-2006-6379 - Unspecified vulnerability in Broadcom products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
broadcom
nessus
exploit available

Summary

Buffer overflow in the BrightStor Backup Discovery Service in multiple CA products, including ARCserve Backup r11.5 SP1 and earlier, ARCserve Backup 9.01 up to 11.1, Enterprise Backup 10.5, and CA Server Protection Suite r2, allows remote attackers to execute arbitrary code via unspecified vectors.

Exploit-Db

descriptionCA BrightStor ARCserve Backup Auto Scanner / Exploiter. CVE-2006-6379. Remote exploit for windows platform
idEDB-ID:1132
last seen2016-01-31
modified2005-08-03
published2005-08-03
reportercybertronic
sourcehttps://www.exploit-db.com/download/1132/
titleCA BrightStor ARCserve Backup Auto Scanner / Exploiter

Nessus

NASL familyWindows
NASL idARCSERVE_DISCOVERY_SERVICE_OVERFLOW.NASL
descriptionAccording to its version, the installation of BrightStor ARCserve Backup on the remote host allows an attacker to execute arbitrary code on the affected host with SYSTEM privileges due to a buffer overflow that can be triggered by a specially crafted packet sent to the Discovery Service. Note that the vendor reports only Windows installs are vulnerable.
last seen2020-06-01
modified2020-06-02
plugin id23841
published2006-12-12
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/23841
titleCA BrightStor ARCserve Backup Discovery Service Overflow

Saint

bid21502
descriptionBrightStor ARCserve Discovery service 9b command buffer overflow
idmisc_arcservedisc
osvdb30775
titlebrightstor_arcserve_disc_9b
typeremote