Show plain JSON{"id": "CVE-2006-6917", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2006-12-31T05:00:00.000", "references": [{"url": "http://supportconnectw.ca.com/public/storage/infodocs/basbrtapeeng-secnotice.asp", "source": "cve@mitre.org"}, {"url": "http://www.lssec.com/advisories/LS-20060908.pdf", "source": "cve@mitre.org"}, {"url": "http://www.lssec.com/advisories/LS-20061001.pdf", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/453930/30/390/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/453933/30/420/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/454088/30/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/454094/30/360/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/456428/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/456711", "source": "cve@mitre.org"}, {"url": "http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=97428", "source": "cve@mitre.org"}, {"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34959", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/3086", "source": "cve@mitre.org"}, {"url": "http://supportconnectw.ca.com/public/storage/infodocs/basbrtapeeng-secnotice.asp", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.lssec.com/advisories/LS-20060908.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.lssec.com/advisories/LS-20061001.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/453930/30/390/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/453933/30/420/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/454088/30/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/454094/30/360/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/456428/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/456711", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=97428", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34959", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/3086", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Multiple buffer overflows in Computer Associates (CA) BrightStor ARCserve Backup R11.5 Server before SP2 allows remote attackers to execute arbitrary code in the Tape Engine (tapeeng.exe) via a crafted RPC request with (1) opnum 38, which is not properly handled in TAPEUTIL.dll 11.5.3884.0, or (2) opnum 37, which is not properly handled in TAPEENG.dll 11.5.3884.0."}, {"lang": "es", "value": "M\u00faltiples desbordamiento de b\u00fafer en Computer Associates (CA) BrightStor ARCserve Backup R11.5 Server versiones anteriores a SP2 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n en el Tape Engine (tapeeng.exe) mediante una petici\u00f3n RPC manipulada con (1) opnum 38, que no es manejado apropiadamente en TAPEUTIL.dll 11.5.3884.0, \u00f3 (2) opnum 37, que no es manejado apropiadamente en TAPEENG.dll 11.5.3884.0."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_server:11.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1B0B919-DFF1-4806-B4B3-5496F68B6595"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}