René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

217 lines
7.9 KiB
JSON

{
"id": "CVE-2005-1272",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-08-05T04:00:00.000",
"lastModified": "2021-04-07T18:20:52.820",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code via a long string sent to port (1) 6070 or (2) 6050."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 permite que atacantes remotos ejecuten c\u00f3digo arbitrario mediante el env\u00edo de una cadena larga al puerto 6070 \u00f3 6050."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "937AD0E8-1FA8-4246-9CDD-5DBC902D2052"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "78AA54EA-DAF1-4635-AA1B-E2E49C4BB597"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*",
"matchCriteriaId": "CFA805A6-4507-4063-A30D-4BE9B6CA5040"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup:9.0_1:*:oracle:*:*:*:*:*",
"matchCriteriaId": "590FC2F4-DEF9-43B5-9FE5-4B28C9BA393C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:oracle:*:*:*:*:*",
"matchCriteriaId": "C0F75ADA-8761-4672-901B-A3D41B5138B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*",
"matchCriteriaId": "D231F28B-F0CC-4B46-801F-E86A371C814B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:oracle:*:*:*:*:*",
"matchCriteriaId": "76B1841C-ECFC-42D5-914F-0B19EB437CDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*",
"matchCriteriaId": "9E11A387-BF4A-4A54-8F29-37EFF14D72DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:exchange:*:*:*:*:*",
"matchCriteriaId": "2355FC94-DC88-4759-959C-BCD037271D15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:sap:*:*:*:*:*",
"matchCriteriaId": "2679DEE2-A318-4319-BB0E-824B6DE03A5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:9.0.1:*:sql:*:*:*:*:*",
"matchCriteriaId": "2D09C368-72B3-4065-A4A5-064595CFC5E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11:*:exchange:*:*:*:*:*",
"matchCriteriaId": "0E007AC1-E84F-4D05-838B-EF317FF455E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sap:*:*:*:*:*",
"matchCriteriaId": "86BCE53E-EE56-4370-8C2A-39D3A4083BB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.0:*:sql:*:*:*:*:*",
"matchCriteriaId": "E8D21407-0C60-4598-87D4-1386E4C20E0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:exchange:*:*:*:*:*",
"matchCriteriaId": "FE8E44C1-250D-4BCE-8F72-4B19D12B4D0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sap:*:*:*:*:*",
"matchCriteriaId": "5CB10448-1451-4BB8-9D9C-46A7CE947FF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup_agent:11.1:*:sql:*:*:*:*:*",
"matchCriteriaId": "5C80D603-C650-465E-A9FD-34BA6E36335A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:oracle:*:*:*:*:*",
"matchCriteriaId": "E53DF21C-D2C0-4982-A02E-3E0D6164F9FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:sap:*:*:*:*:*",
"matchCriteriaId": "DF691595-496E-4024-BB46-B36BB369E8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.0:*:sql:*:*:*:*:*",
"matchCriteriaId": "025B5168-F250-4541-ADAC-46395E58D89C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:oracle:*:*:*:*:*",
"matchCriteriaId": "59089180-9FCC-4048-85E6-24C260736A29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:sap:*:*:*:*:*",
"matchCriteriaId": "17445E00-10FF-4BB6-9FA9-9C68444B8ABD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:brightstor_enterprise_backup_agent:10.5:*:sql:*:*:*:*:*",
"matchCriteriaId": "897538FC-F1C7-4834-B45E-0B9EF5A609FE"
}
]
}
]
}
],
"references": [
{
"url": "http://www.idefense.com/application/poi/display?id=287&type=vulnerabilities&flashstatus=true",
"source": "cve@mitre.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/279774",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/14453",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33239",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21656",
"source": "cve@mitre.org"
}
]
}