Computer Security
[EN] securityvulns.ru no-pyccku


CA XOsoft buffer overflow
Published:12.12.2010
Source:
SecurityVulns ID:11293
Type:remote
Threat Level:
6/10
Description:Buffer overflow on SOAP request parsing.
Affected:CA : XOsoft 12.0
 CA : XOsoft 12.5
 CA : ARCserve Replication and High Availability 15.0
CVE:CVE-2010-3984 (Buffer overflow in mng_core_com.dll in CA XOsoft Replication r12.0 SP1 and r12.5 SP2 rollup, CA XOsoft High Availability r12.0 SP1 and r12.5 SP2 rollup, CA XOsoft Content Distribution r12.0 SP1 and r12.5 SP2 rollup, and CA ARCserve Replication and High Availability (RHA) r15.0 SP1 allows remote attackers to execute arbitrary code via a crafted create_session_bab operation in a SOAP request to xosoapapi.asmx.)
Original documentdocumentCA, CA20101209-01: Security Notice for CA XOsoft (12.12.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod