2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2007-5006" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2007-10-01T20:17:00.000" ,
2024-11-22 07:15:30 +00:00
"lastModified" : "2024-11-21T00:36:55.573" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple command handlers in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 do not verify if a peer is authenticated, which allows remote attackers to add and delete users, and start client restores."
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiples gestores de comandos de CA (Computer Associates) BrightStor ARCserve Backup para Port\u00e1til y Sobremesa r11.0 hasta r11.5 no verifican si un par est\u00e1 autenticado, lo cual permite a atacantes remotos a\u00f1adir y borrar usuarios, e inicializar recuperaciones de cliente."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 10.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-287"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "261A513C-CBD4-4A1C-B58A-A9005774EC87"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4FB993B2-9A44-40E2-AA05-0CAD04BDC26D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C7461AE5-2067-4964-93B7-560CD02CEAC8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "9DAE8E8B-7FD6-43CB-B07A-6D3B31E94DC9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7B9C97C1-D295-4A84-B179-3FDF51DE1DD9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:desktop_management_suite:11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "237F2346-0B9B-4CE8-8EF9-813CB3F1BC1B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22268F99-2F38-481D-A0CC-B1FC96FDB953"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:desktop_management_suite:11.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E6195AFF-0039-4F48-9E02-ACE8CF052EA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47C10BA4-B241-4F65-8FA1-AD88266C03B0"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=598" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/25606" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35677" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/480252/100/100/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/24348" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securitytracker.com/id?1018728" ,
"source" : "cve@mitre.org"
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=598" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/25606" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35677" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/480252/100/100/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/24348" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securitytracker.com/id?1018728" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}