Veritas StorageCentral 5.2 Rev. 2190r DCOM Server stack-based overflow
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.2 | $0-$5k | 0.00 |
A vulnerability was found in Veritas StorageCentral 5.2 Rev. 2190r. It has been rated as critical. Affected by this issue is an unknown code of the component DCOM Server. The manipulation with an unknown input leads to a stack-based overflow vulnerability. Using CWE to declare the problem leads to CWE-121. A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). Impacted is availability. CVE summarizes:
Multiple heap-based and stack-based buffer overflows in certain DCOM server components in VERITAS Storage Exec Storage Exec 5.3 before Hotfix 9 and StorageCentral 5.2 before Hot Fix 2 allow remote attackers to execute arbitrary code via certain ActiveX controls.
The bug was discovered 09/20/2005. The weakness was shared 09/19/2005 by Mark Litchfield with NGSSoftware (Website). The advisory is available at securityresponse.symantec.com. This vulnerability is handled as CVE-2005-2996 since 09/20/2005. The attack may be launched remotely. No form of authentication is required for exploitation. The technical details are unknown and an exploit is not available.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at support.veritas.com.
The entry 1753 is related to this item.
Product
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 7.2
VulDB Base Score: 7.5
VulDB Temp Score: 7.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Stack-based overflowCWE: CWE-121 / CWE-119
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: support.veritas.com
Timeline
09/19/2005 🔍09/19/2005 🔍
09/20/2005 🔍
09/20/2005 🔍
09/20/2005 🔍
09/20/2005 🔍
12/08/2005 🔍
07/04/2019 🔍
Sources
Advisory: securityresponse.symantec.comResearcher: Mark Litchfield
Organization: NGSSoftware
Status: Not defined
Confirmation: 🔍
CVE: CVE-2005-2996 (🔍)
Vulnerability Center: 9889 - Veritas Storage Exec and StorageCentral Buffer Overflow in DCOM Server Components, Medium
SecurityFocus: 14801
Secunia: 16871 - VERITAS Storage Exec / StorageCentral DCOM Server Buffer Overflow, Moderately Critical
OSVDB: 19571 - Veritas - Storage Exec Multiple Remote DCOM Buffer Overflow Issues
See also: 🔍
Entry
Created: 09/20/2005 17:29Updated: 07/04/2019 14:11
Changes: 09/20/2005 17:29 (68), 07/04/2019 14:11 (6)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.