arcserve_replication_and_high_availability,xosoft_replication,xosoft_content_distribution,xosoft_hig

admin 2023-12-09 03:34:12 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
arcserve_replication_and_high_availability,xosoft_replication,xosoft_content_distribution,xosoft_high_availability 缓冲区溢出代码执行漏洞

CVE编号

CVE-2010-3984

利用情况

暂无

补丁情况

N/A

披露时间

2011-01-08
漏洞描述
Buffer overflow in mng_core_com.dll in CA XOsoft Replication r12.0 SP1 and r12.5 SP2 rollup, CA XOsoft High Availability r12.0 SP1 and r12.5 SP2 rollup, CA XOsoft Content Distribution r12.0 SP1 and r12.5 SP2 rollup, and CA ARCserve Replication and High Availability (RHA) r15.0 SP1 allows remote attackers to execute arbitrary code via a crafted create_session_bab operation in a SOAP request to xosoapapi.asmx.
解决建议
用户可参考如下供应商提供的安全补丁:Computer Associates ARCserve Replication and High Availability r15.0 sp1Computer Associates RO24455https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24455&os =WINDOWS&actionID=3Computer Associates XOsoft Replication r12.0 sp1Computer Associates RO24314https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24314&os =WINDOWS&actionID=3Computer Associates XOsoft High Availability r12.0 sp1Computer Associates RO24314https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24314&os =WINDOWS&actionID=3Computer Associates XOsoft Content Distribution r12.0 sp1Computer Associates RO24314https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24314&os =WINDOWS&actionID=3Computer Associates XOsoft High Availability r12.5 sp2 rollupComputer Associates RO24313https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24313&os =WINDOWS&actionID=3Computer Associates XOsoft Content Distribution r12.5 sp2 rollupComputer Associates RO24313https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24313&os =WINDOWS&actionID=3Computer Associates XOsoft Replication r12.5 sp2 rollupComputer Associates RO24313https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24313&os =WINDOWS&actionID=3
参考链接
http://secunia.com/advisories/42561
http://www.securityfocus.com/archive/1/515115/100/0/threaded
http://www.securityfocus.com/bid/45317
http://www.securitytracker.com/id?1024852
http://www.zerodayinitiative.com/advisories/ZDI-10-263/
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7bFEB41C...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 ca arcserve_replication_and_high_availability r15.0 -
运行在以下环境
应用 ca xosoft_content_distribution r12.0 -
运行在以下环境
应用 ca xosoft_content_distribution r12.5 -
运行在以下环境
应用 ca xosoft_high_availability r12.0 -
运行在以下环境
应用 ca xosoft_high_availability r12.5 -
运行在以下环境
应用 ca xosoft_replication r12.0 -
运行在以下环境
应用 ca xosoft_replication r12.5 -
CVSS3评分 7.5
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 无
  • 影响范围 N/A
  • 用户交互 无
  • 可用性 部分地
  • 保密性 部分地
  • 完整性 部分地
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-ID 漏洞类型
CWE-119 内存缓冲区边界内操作的限制不恰当
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0