CVE-2008-1472
Published Mar 24, 2008
Last updated 6 years ago
Overview
- Description
- Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:computer_associates:brightstor_arcserve_backup_laptops_desktops:11.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CB967E4-2CE5-4283-A798-2C083AFB5B56" }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8FAF118-7DCB-4F6E-8645-102ED226828B" }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:c1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04E5D3CF-9015-4D84-A498-25120C4DDC4E" }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:ga:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BC9155B-394F-4DB0-ACEE-CFF62E03A44A" }, { "criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEBE5366-CEDA-4CF2-9625-13E9D9E93B41" }, { "criteria": "cpe:2.3:a:computer_associates:unicenter_dsm_r11_list_control_atx:11.2.3.1895:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C68A1807-ED3A-4E7B-84BF-BB6AD0916174" }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21C1E9A1-00F4-4866-9899-D644BD1E6E65" }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:c1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A89E3C3-861F-41DE-B46C-776E4BDC6F16" }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:ga:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "170FCD6A-792C-452D-97E3-FE9A354D95D6" }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B9F9C9B-CD0E-42B6-B654-EE9E16A93790" }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBD24EBE-2942-4A0D-9481-FEC5BE9C94C4" }, { "criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:c1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80486731-420B-4B2F-B2C3-B40E0C57ACFB" }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4E67182-4AC8-4094-AC4F-815E40AE82E9" }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:c1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2A6834E-2E6C-4DC6-B8F7-BB3FE643BE5E" }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:ga:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D4976C0-DF5F-4A7E-AEC1-6C90E82F5047" }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C03C0146-12CF-437E-B13A-C13FC06EC0F2" }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2FE92F0-0F01-455F-8A13-1FC8E65F2117" }, { "criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:c1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "078BC506-4092-4FE4-8AD2-1DDD92848852" }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1607DE7-0078-4BF3-8E28-59F1CBC7775A" }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:c1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0834E9C-2B65-4AB9-B4A7-410282967975" }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:ga:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71B90EAA-275B-4E9E-B254-C4EC8158939F" }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C3338E5-87AC-4D7C-96EF-38A8B43D0060" }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCD51973-2876-44AD-8FC5-0469267E71C6" }, { "criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:c1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "860B437B-5C99-421D-BAAE-56F583DAA532" }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AF37FA7-6556-49FC-B7C9-D5530BDA00D1" }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:c1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92EBC724-75AB-4201-AD97-1A05A7F46941" }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:ga:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50BCB284-7A16-4EAE-A8DF-9C432CD71490" }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "174BBEAB-EE21-4CBC-BE54-E51A4DD95D28" }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57EC5134-D419-44A2-885C-72CB7724F0E8" }, { "criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:c1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CDB0DF2-6160-4059-B379-78E45B4E8D4D" } ], "operator": "OR" } ] } ]