CVE-2006-6917
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
31/12/2006
Last modified:
09/04/2025
Description
Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup R11.5 Server before SP2 allows remote attackers to execute arbitrary code in the Tape Engine (tapeeng.exe) via a crafted RPC request with (1) opnum 38, which is not properly handled in TAPEUTIL.dll 11.5.3884.0, or (2) opnum 37, which is not properly handled in TAPEENG.dll 11.5.3884.0.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:broadcom:brightstor_arcserve_backup_server:11.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://supportconnectw.ca.com/public/storage/infodocs/basbrtapeeng-secnotice.asp
- http://www.lssec.com/advisories/LS-20060908.pdf
- http://www.lssec.com/advisories/LS-20061001.pdf
- http://www.securityfocus.com/archive/1/453930/30/390/threaded
- http://www.securityfocus.com/archive/1/453933/30/420/threaded
- http://www.securityfocus.com/archive/1/454088/30/0/threaded
- http://www.securityfocus.com/archive/1/454094/30/360/threaded
- http://www.securityfocus.com/archive/1/456428/100/0/threaded
- http://www.securityfocus.com/archive/1/456711
- http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=97428
- http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34959
- https://www.exploit-db.com/exploits/3086
- http://supportconnectw.ca.com/public/storage/infodocs/basbrtapeeng-secnotice.asp
- http://www.lssec.com/advisories/LS-20060908.pdf
- http://www.lssec.com/advisories/LS-20061001.pdf
- http://www.securityfocus.com/archive/1/453930/30/390/threaded
- http://www.securityfocus.com/archive/1/453933/30/420/threaded
- http://www.securityfocus.com/archive/1/454088/30/0/threaded
- http://www.securityfocus.com/archive/1/454094/30/360/threaded
- http://www.securityfocus.com/archive/1/456428/100/0/threaded
- http://www.securityfocus.com/archive/1/456711
- http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=97428
- http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34959
- https://www.exploit-db.com/exploits/3086



