Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-42gq-297f-29c4

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The cadbd RPC service in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to (1) execute arbitrary code via stack-based buffer overflows in unspecified RPC procedures, and (2) trigger memory corruption related to the use of "handle" RPC arguments as pointers.

The cadbd RPC service in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to (1) execute arbitrary code via stack-based buffer overflows in unspecified RPC procedures, and (2) trigger memory corruption related to the use of "handle" RPC arguments as pointers.

EPSS

Процентиль: 96%
0.25023
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 18 лет назад

The cadbd RPC service in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to (1) execute arbitrary code via stack-based buffer overflows in unspecified RPC procedures, and (2) trigger memory corruption related to the use of "handle" RPC arguments as pointers.

EPSS

Процентиль: 96%
0.25023
Средний

Дефекты

CWE-119