First published: Fri Jan 07 2011(Updated: )
Buffer overflow in mng_core_com.dll in CA XOsoft Replication r12.0 SP1 and r12.5 SP2 rollup, CA XOsoft High Availability r12.0 SP1 and r12.5 SP2 rollup, CA XOsoft Content Distribution r12.0 SP1 and r12.5 SP2 rollup, and CA ARCserve Replication and High Availability (RHA) r15.0 SP1 allows remote attackers to execute arbitrary code via a crafted create_session_bab operation in a SOAP request to xosoapapi.asmx.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA XOsoft Replication | =r12.5-sp2 | |
CA ARCserve Replication and High Availability | =r15.0-sp1 | |
CA XOsoft Content Distribution | =r12.0-sp1 | |
CA XOsoft Content Distribution | =r12.5-sp2 | |
CA XOsoft High Availability | =r12.0-sp1 | |
CA XOsoft Replication | =r12.0-sp1 | |
CA XOsoft High Availability | =r12.5-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3984 is classified as a medium-severity vulnerability due to the potential for remote code execution through a buffer overflow.
To mitigate CVE-2010-3984, users should apply the latest security patches or updates provided by CA Technologies for the affected software versions.
CVE-2010-3984 affects multiple versions of CA XOsoft Replication, CA XOsoft High Availability, CA XOsoft Content Distribution, and CA ARCserve Replication and High Availability.
Yes, CVE-2010-3984 can be exploited remotely, allowing attackers to execute arbitrary code on affected systems.
Exploiting CVE-2010-3984 can result in unauthorized access, control, and potentially detrimental changes to the affected systems.