The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/41853 | vdb entry |
http://www.kb.cert.org/vuls/id/684883 | third party advisory us government resource |
http://secunia.com/advisories/29837 | third party advisory vendor advisory |
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256 | patch vendor advisory |
http://www.securityfocus.com/archive/1/490959/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2008/1249/references | vdb entry vendor advisory |
http://www.securityfocus.com/bid/28809 | vdb entry patch |
http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx | patch vendor advisory |
http://www.securitytracker.com/id?1019872 | vdb entry |