CVE-2005-2535
Scores
EPSS
Percentile: 82.9%
CVSS
CVSS Score: 7.5/10
All CVSS Scores
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Authentication
None (N)
Describes the level of privileges an attacker must possess
Confidentiality Impact
Partial
Measures the impact to the confidentiality of information
Integrity Impact
Partial
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
Partial
Measures the impact to the availability of the impacted component
Description
Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260.
Scaner-VS 7 — a modern vulnerability management solution
Sources
Exploits
Vulnerable Software (4)
Type: Configuration
Vendor: *
Product: arcserve_backup_2000
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*", "vulnerable": true } ], "operator": "OR"}
Source: nvd
Type: Configuration
Vendor: *
Product: brightstor_arcserve_backup
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*", "vulnerable": true } ], "operator": "OR"}
Source: nvd
Type: Configuration
Vendor: *
Product: brightstor_arcserve_backup_hp
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*", "vulnerable": true } ], "operator": "OR"}
Source: nvd
Type: Configuration
Vendor: *
Product: brightstor_enterprise_backup
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:broadcom:arcserve_backup_2000:r16.5:*:windows:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:7.0:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:linux:ja:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0:*:netware:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.0.1:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.0:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:macintosh:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:netware:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:tru64:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup_hp:11.1:*:hp:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:hpux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.0:*:mainframe_linux:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:aix:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:hp:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:solaris:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:tru64:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:windows:*:*:*:*:*", "vulnerable": true } ], "operator": "OR"}
Source: nvd