Vulnerabilities > CVE-2006-6917 - Unspecified vulnerability in Broadcom Brightstor Arcserve Backup Server 11.5
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup R11.5 Server before SP2 allows remote attackers to execute arbitrary code in the Tape Engine (tapeeng.exe) via a crafted RPC request with (1) opnum 38, which is not properly handled in TAPEUTIL.dll 11.5.3884.0, or (2) opnum 37, which is not properly handled in TAPEENG.dll 11.5.3884.0.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | CA BrightStor ARCserve (tapeeng.exe) Remote Buffer Overflow Exploit. CVE-2006-6917. Remote exploit for windows platform |
file | exploits/windows/remote/3086.py |
id | EDB-ID:3086 |
last seen | 2016-01-31 |
modified | 2007-01-05 |
platform | windows |
port | 6502 |
published | 2007-01-05 |
reporter | Winny Thomas |
source | https://www.exploit-db.com/download/3086/ |
title | CA BrightStor ARCserve tapeeng.exe Remote Buffer Overflow Exploit |
type | remote |
Nessus
NASL family | Windows |
NASL id | ARCSERVE_QO84983.NASL |
description | According to its version, the installation of BrightStor ARCserve Backup on the remote host is affected by multiple buffer overflows that can be exploited by an unauthenticated, remote attacker to execute arbitrary code on the affected host with SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24015 |
published | 2007-01-15 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24015 |
title | CA BrightStor ARCserve Backup Multiple Vulnerabilities (QO84983) |
code |
|
References
- http://supportconnectw.ca.com/public/storage/infodocs/basbrtapeeng-secnotice.asp
- http://www.lssec.com/advisories/LS-20060908.pdf
- http://www.lssec.com/advisories/LS-20061001.pdf
- http://www.securityfocus.com/archive/1/453930/30/390/threaded
- http://www.securityfocus.com/archive/1/453933/30/420/threaded
- http://www.securityfocus.com/archive/1/454088/30/0/threaded
- http://www.securityfocus.com/archive/1/454094/30/360/threaded
- http://www.securityfocus.com/archive/1/456428/100/0/threaded
- http://www.securityfocus.com/archive/1/456711
- http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=97428
- http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34959
- https://www.exploit-db.com/exploits/3086