arcserve_replication_and_high_availability,xosoft_replication,xosoft_content_distribution,xosoft_high_availability 缓冲区溢出代码执行漏洞
CVE编号
CVE-2010-3984利用情况
暂无补丁情况
N/A披露时间
2011-01-08漏洞描述
Buffer overflow in mng_core_com.dll in CA XOsoft Replication r12.0 SP1 and r12.5 SP2 rollup, CA XOsoft High Availability r12.0 SP1 and r12.5 SP2 rollup, CA XOsoft Content Distribution r12.0 SP1 and r12.5 SP2 rollup, and CA ARCserve Replication and High Availability (RHA) r15.0 SP1 allows remote attackers to execute arbitrary code via a crafted create_session_bab operation in a SOAP request to xosoapapi.asmx.解决建议
用户可参考如下供应商提供的安全补丁:Computer Associates ARCserve Replication and High Availability r15.0 sp1Computer Associates RO24455https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24455&os =WINDOWS&actionID=3Computer Associates XOsoft Replication r12.0 sp1Computer Associates RO24314https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24314&os =WINDOWS&actionID=3Computer Associates XOsoft High Availability r12.0 sp1Computer Associates RO24314https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24314&os =WINDOWS&actionID=3Computer Associates XOsoft Content Distribution r12.0 sp1Computer Associates RO24314https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24314&os =WINDOWS&actionID=3Computer Associates XOsoft High Availability r12.5 sp2 rollupComputer Associates RO24313https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24313&os =WINDOWS&actionID=3Computer Associates XOsoft Content Distribution r12.5 sp2 rollupComputer Associates RO24313https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24313&os =WINDOWS&actionID=3Computer Associates XOsoft Replication r12.5 sp2 rollupComputer Associates RO24313https://support.ca.com/irj/portal/anonymous/solndtls?aparNo=RO24313&os =WINDOWS&actionID=3受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | ca | arcserve_replication_and_high_availability | r15.0 | - | |||||
运行在以下环境 | |||||||||
应用 | ca | xosoft_content_distribution | r12.0 | - | |||||
运行在以下环境 | |||||||||
应用 | ca | xosoft_content_distribution | r12.5 | - | |||||
运行在以下环境 | |||||||||
应用 | ca | xosoft_high_availability | r12.0 | - | |||||
运行在以下环境 | |||||||||
应用 | ca | xosoft_high_availability | r12.5 | - | |||||
运行在以下环境 | |||||||||
应用 | ca | xosoft_replication | r12.0 | - | |||||
运行在以下环境 | |||||||||
应用 | ca | xosoft_replication | r12.5 | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 部分地
- 保密性 部分地
- 完整性 部分地
CWE-ID | 漏洞类型 |
CWE-119 | 内存缓冲区边界内操作的限制不恰当 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论