CVE-2005-2535

Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html - Broken Link () http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html - Broken Link
References () http://archives.neohapsis.com/archives/bugtraq/2005-02/0141.html - Broken Link () http://archives.neohapsis.com/archives/bugtraq/2005-02/0141.html - Broken Link
References () http://archives.neohapsis.com/archives/bugtraq/2005-02/0201.html - Broken Link () http://archives.neohapsis.com/archives/bugtraq/2005-02/0201.html - Broken Link
References () http://secunia.com/advisories/14293 - Patch, Vendor Advisory () http://secunia.com/advisories/14293 - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/966880 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/966880 - Patch, Third Party Advisory, US Government Resource
References () http://www.osvdb.org/13814 - Broken Link () http://www.osvdb.org/13814 - Broken Link
References () http://www.securityfocus.com/bid/12536 - Exploit, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/12536 - Exploit, Patch, Third Party Advisory, VDB Entry
References () http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?ID=32478 - Patch () http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?ID=32478 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19320 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/19320 - Third Party Advisory, VDB Entry

20 May 2021, 20:10

Type Values Removed Values Added
CPE cpe:2.3:a:ca:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*
cpe:2.3:a:ca:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*
cpe:2.3:a:ca:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*
cpe:2.3:a:ca:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*
cpe:2.3:a:ca:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*
cpe:2.3:a:ca:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*
cpe:2.3:a:ca:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*
cpe:2.3:a:ca:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*
cpe:2.3:a:ca:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:*
cpe:2.3:a:ca:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*
cpe:2.3:a:ca:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*
cpe:2.3:a:ca:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*
cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*

Information

Published : 2005-08-10 04:00

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2535

Mitre link : CVE-2005-2535

CVE.ORG link : CVE-2005-2535


JSON object : View

Products Affected

broadcom

  • arcserve_backup_2000
  • brightstor_arcserve_backup
  • brightstor_enterprise_backup
  • brightstor_arcserve_backup_hp