Vulnerability Details : CVE-2008-3175
Integer underflow in rxRPC.dll in the LGServer service in the server in CA ARCserve Backup for Laptops and Desktops 11.0 through 11.5 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted message that triggers a buffer overflow.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2008-3175
- cpe:2.3:a:ca:brightstor_arcserve_backup:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:sp2:*:*:*:*:*
- cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:sp1:*:*:*:*:*
- cpe:2.3:a:ca:protection_suites:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:ca:protection_suites:2:*:*:*:*:*:*:*
- cpe:2.3:a:ca:protection_suites:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:ca:arcserve_backup_for_laptops_and_desktops:11.1:*:*:*:*:*:*:*
- cpe:2.3:a:ca:arcserve_backup_for_laptops_and_desktops:11.1:*:sp1:*:*:*:*:*
- cpe:2.3:a:ca:arcserve_backup_for_laptops_and_desktops:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:ca:arcserve_backup_for_laptops_and_desktops:11.1:*:sp2:*:*:*:*:*
- cpe:2.3:a:ca:arcserve_backup_for_laptops_and_desktops:11.5:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:desktop_management_suite:11.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-3175
24.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-3175
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2008-3175
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3175
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44137
-
http://www.securityfocus.com/bid/30472
Patch
-
http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063594.html
-
http://www.securityfocus.com/archive/1/495020/100/0/threaded
-
http://www.vupen.com/english/advisories/2008/2286
Vendor Advisory
-
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=181721
Patch;Vendor Advisory
-
http://www.securitytracker.com/id?1020590
Jump to