Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp", "name": "http://supportconnectw.ca.com/public/storage/infodocs/babimpsec-notice.asp", "tags": ["Exploit"], "refsource": "CONFIRM"}, {"url": "http://www.iss.net/threats/253.html", "name": "20070111 Computer Associates Brightstor ARCserve Mediasvr.exe String Handling Overflow", "tags": [], "refsource": "ISS"}, {"url": "http://www.securityfocus.com/bid/22016", "name": "22016", "tags": [], "refsource": "BID"}, {"url": "http://secunia.com/advisories/23648", "name": "23648", "tags": [], "refsource": "SECUNIA"}, {"url": "http://securitytracker.com/id?1017506", "name": "1017506", "tags": [], "refsource": "SECTRACK"}, {"url": "http://www.securityfocus.com/archive/1/456711", "name": "20070111 [CAID 34955, 34956, 34957, 34958, 34959, 34817]: CA BrightStor ARCserve Backup Multiple Overflow Vulnerabilities", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://osvdb.org/31320", "name": "31320", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.vupen.com/english/advisories/2007/0154", "name": "ADV-2007-0154", "tags": [], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29344", "name": "backup-product-string-overflow(29344)", "tags": [], "refsource": "XF"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Stack-based buffer overflow in the RPC interface in Mediasvr.exe in Computer Associates (CA) Brightstor ARCserve Backup 9.01 through 11.5, Enterprise Backup 10.5, and CA Protection Suites r2 allows remote attackers to execute arbitrary code via crafted SUNRPC packets, aka the \"Mediasvr.exe String Handling Overflow,\" a different vulnerability than CVE-2006-5171."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-5172", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": true, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2007-01-16T20:28Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "11.5"}, {"cpe23Uri": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-04-07T18:20Z"}