2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-1272" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-08-05T04:00:00.000" ,
2024-11-21 23:11:37 +00:00
"lastModified" : "2024-11-20T23:56:58.370" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code via a long string sent to port (1) 6070 or (2) 6050."
} ,
{
"lang" : "es" ,
"value" : "Desbordamiento de b\u00fafer en Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 permite que atacantes remotos ejecuten c\u00f3digo arbitrario mediante el env\u00edo de una cadena larga al puerto 6070 \u00f3 6050."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-11-21 23:11:37 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-21 23:11:37 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : true ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "937AD0E8-1FA8-4246-9CDD-5DBC902D2052"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78AA54EA-DAF1-4635-AA1B-E2E49C4BB597"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "CFA805A6-4507-4063-A30D-4BE9B6CA5040"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup:9.0_1:*:oracle:*:*:*:*:*" ,
"matchCriteriaId" : "590FC2F4-DEF9-43B5-9FE5-4B28C9BA393C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:oracle:*:*:*:*:*" ,
"matchCriteriaId" : "C0F75ADA-8761-4672-901B-A3D41B5138B0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "D231F28B-F0CC-4B46-801F-E86A371C814B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:oracle:*:*:*:*:*" ,
"matchCriteriaId" : "76B1841C-ECFC-42D5-914F-0B19EB437CDE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "9E11A387-BF4A-4A54-8F29-37EFF14D72DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:exchange:*:*:*:*:*" ,
"matchCriteriaId" : "2355FC94-DC88-4759-959C-BCD037271D15"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:sap:*:*:*:*:*" ,
"matchCriteriaId" : "2679DEE2-A318-4319-BB0E-824B6DE03A5B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:sql:*:*:*:*:*" ,
"matchCriteriaId" : "2D09C368-72B3-4065-A4A5-064595CFC5E1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11:*:exchange:*:*:*:*:*" ,
"matchCriteriaId" : "0E007AC1-E84F-4D05-838B-EF317FF455E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sap:*:*:*:*:*" ,
"matchCriteriaId" : "86BCE53E-EE56-4370-8C2A-39D3A4083BB0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sql:*:*:*:*:*" ,
"matchCriteriaId" : "E8D21407-0C60-4598-87D4-1386E4C20E0B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:exchange:*:*:*:*:*" ,
"matchCriteriaId" : "FE8E44C1-250D-4BCE-8F72-4B19D12B4D0D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sap:*:*:*:*:*" ,
"matchCriteriaId" : "5CB10448-1451-4BB8-9D9C-46A7CE947FF1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sql:*:*:*:*:*" ,
"matchCriteriaId" : "5C80D603-C650-465E-A9FD-34BA6E36335A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:oracle:*:*:*:*:*" ,
"matchCriteriaId" : "E53DF21C-D2C0-4982-A02E-3E0D6164F9FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:sap:*:*:*:*:*" ,
"matchCriteriaId" : "DF691595-496E-4024-BB46-B36BB369E8AF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:sql:*:*:*:*:*" ,
"matchCriteriaId" : "025B5168-F250-4541-ADAC-46395E58D89C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:oracle:*:*:*:*:*" ,
"matchCriteriaId" : "59089180-9FCC-4048-85E6-24C260736A29"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:sap:*:*:*:*:*" ,
"matchCriteriaId" : "17445E00-10FF-4BB6-9FA9-9C68444B8ABD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:sql:*:*:*:*:*" ,
"matchCriteriaId" : "897538FC-F1C7-4834-B45E-0B9EF5A609FE"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.idefense.com/application/poi/display?id=287&type=vulnerabilities&flashstatus=true" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/279774" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/14453" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch"
]
} ,
{
"url" : "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33239" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/21656" ,
"source" : "cve@mitre.org"
2024-11-21 23:11:37 +00:00
} ,
{
"url" : "http://www.idefense.com/application/poi/display?id=287&type=vulnerabilities&flashstatus=true" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/279774" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/14453" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Patch"
]
} ,
{
"url" : "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33239" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/21656" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}