Описание
The RPC service in mediasvr.exe in CA BrightStor ARCserve Backup 11.5 SP2 build 4237 allows remote attackers to execute arbitrary code via crafted xdr_handle_t data in RPC packets, which is used in calculating an address for a function call, as demonstrated using the 191 (0xbf) RPC request.
The RPC service in mediasvr.exe in CA BrightStor ARCserve Backup 11.5 SP2 build 4237 allows remote attackers to execute arbitrary code via crafted xdr_handle_t data in RPC packets, which is used in calculating an address for a function call, as demonstrated using the 191 (0xbf) RPC request.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-1785
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33316
- http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0467.html
- http://secunia.com/advisories/24682
- http://securityreason.com/securityalert/2509
- http://supportconnectw.ca.com/public/storage/infodocs/babmedser-secnotice.asp
- http://www.kb.cert.org/vuls/id/151305
- http://www.securityfocus.com/archive/1/464270/100/0/threaded
- http://www.securityfocus.com/archive/1/464343/100/0/threaded
- http://www.securityfocus.com/bid/23209
- http://www.securitytracker.com/id?1017830
- http://www.shirkdog.us/camediasvrremote.py
- http://www.shirkdog.us/shk-004.html
- http://www.vupen.com/english/advisories/2007/1161
EPSS
CVE ID
Связанные уязвимости
The RPC service in mediasvr.exe in CA BrightStor ARCserve Backup 11.5 SP2 build 4237 allows remote attackers to execute arbitrary code via crafted xdr_handle_t data in RPC packets, which is used in calculating an address for a function call, as demonstrated using the 191 (0xbf) RPC request.
EPSS