Multiple buffer overflows in CA BrightStor ARCserve Backup r11.5 SP1 and earlier, r11.1, and 9.01; BrightStor ARCserve Backup for Windows r11; BrightStor Enterprise Backup 10.5; Server Protection Suite r2; and Business Protection Suite r2 allow remote attackers to execute arbitrary code via crafted data on TCP port 6071 to the Backup Agent RPC Server (DBASVR.exe) using the RPC routines with opcode (1) 0x01, (2) 0x02, or (3) 0x18; invalid stub data on TCP port 6503 to the RPC routines with opcode (4) 0x2b or (5) 0x2d in ASCORE.dll in the Message Engine RPC Server (msgeng.exe); (6) a long hostname on TCP port 41523 to ASBRDCST.DLL in the Discovery Service (casdscsvc.exe); or unspecified vectors related to the (7) Job Engine Service.
References
Link Providers
https://www.spirityenterprise.com/pentest spirity
http://secunia.com/advisories/22285 cve-icon cve-icon
http://securitytracker.com/id?1017003 cve-icon cve-icon
http://securitytracker.com/id?1017004 cve-icon cve-icon
http://securitytracker.com/id?1017005 cve-icon cve-icon
http://securitytracker.com/id?1017006 cve-icon cve-icon
http://supportconnectw.ca.com/public/storage/infodocs/basbr-secnotice.asp cve-icon cve-icon
http://www.kb.cert.org/vuls/id/361792 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/860048 cve-icon cve-icon
http://www.lssec.com/advisories/LS-20060220.pdf cve-icon cve-icon
http://www.lssec.com/advisories/LS-20060313.pdf cve-icon cve-icon
http://www.lssec.com/advisories/LS-20060330.pdf cve-icon cve-icon
http://www.securityfocus.com/archive/1/447839/100/100/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/447847/100/200/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/447848/100/100/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/447862/100/100/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/447926/100/200/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/447927/100/200/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/447930/100/200/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/20365 cve-icon cve-icon
http://www.tippingpoint.com/security/advisories/TSRT-06-11.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3930 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-06-030.html cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-06-031.html cve-icon cve-icon
http://www3.ca.com/securityadvisor/blogs/posting.aspx?pid=93775&id=90744 cve-icon cve-icon
http://www3.ca.com/securityadvisor/blogs/posting.aspx?pid=94397&id=90744 cve-icon cve-icon
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34693 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/29364 cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T19:41:05.212Z

Reserved: 2006-10-02T00:00:00

Link: CVE-2006-5143

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2006-10-10T04:06:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2006-5143

cve-icon Redhat

No data.