Title: CA ARCserve Backup Discovery Service Denial of Service
Vulnerability
CA Advisory Date: 2008-06-17
Reported By: Luigi Auriemma
Impact: A remote attacker can cause a denial of service.
Summary: CA ARCserve Backup contains a vulnerability in the
Discovery service (casdscsvc) that can allow a remote attacker to
cause a denial of service condition. CA has issued patches to
address the vulnerability. The vulnerability, CVE-2008-1979,
occurs due to insufficient verification of client data. An
attacker can make a request that can crash the service.
Mitigating Factors: None
Severity: CA has given this vulnerability a Medium risk rating.
Affected Products:
CA ARCserve Backup r12.0 Windows
CA ARCserve Backup r11.5 Windows SP3 and prior*
CA ARCserve Backup r11.1 Windows*
CA ARCserve Backup r11.1 Netware*
CA Server Protection Suite r2
CA Business Protection Suite r2
CA Business Protection Suite for Microsoft Small Business Server
Standard Edition r2
CA Business Protection Suite for Microsoft Small Business Server
Premium Edition r2
*Formerly known as BrightStor ARCserve Backup
Non-affected Products:
CA ARCserve Backup r11.5 Windows SP4
Affected Platforms:
Windows and Netware
Status and Recommendation:
CA has issued the following patches to address the
vulnerabilities.
CA ARCserve Backup r12.0 Windows: QO99574
CA ARCserve Backup r11.5 Windows: QO99575
For CA ARCserve Backup r11.5 Windows, the issue can also be
addressed by applying 11.5 SP4: QO99129
CA ARCserve Backup r11.1 Windows: QO99576
CA ARCserve Backup r11.1 Netware: QO99579
CA Protection Suites r2: QO99575
How to determine if you are affected:
CA ARCserve Backup r12.0 Windows:
1. Run the ARCserve Patch Management utility. From the Windows
Start menu, it can be found under Programs->CA->ARCserve Patch
Management->Patch Status.
2. The main patch status screen will indicate if patch “QO99574”
is currently applied. If the patch is not applied, the
installation is vulnerable.
For more information on the ARCserve Patch Management utility,
read document TEC446265.
Alternatively, use the file information below to determine if the
product installation is vulnerable.
CA ARCserve Backup r12.0 Windows,
CA ARCserve Backup r11.5 Windows,
CA ARCserve Backup r11.1 Windows,
CA ARCserve Backup r11.1 Netware,
CA Protection Suites r2*:
1. Using Windows Explorer, locate the file “asbrdcst.dll”. By
default, the file is located in the
“C:\Program Files\CA\SharedComponents\ARCserve Backup\CADS”
directory on 32 bit systems and “C:\Program Files (x86)\CA\
SharedComponents\ARCserve Backup\CADS” on 64 bit systems.
2. Right click on the file and select Properties.
3. Select the General tab.
4. If the file timestamp is earlier than indicated in the below
table, the installation is vulnerable.
* For Protection Suites r2, use the file timestamp for CA ARCserve
Backup r11.5 English
Product Ver Product Lang File Name File Sz Timestamp
(bytes)
12.0 Windows English asbrdcst.dll 324872 05/01/2008 12:11
12.0 Windows Spanish asbrdcst.dll 324872 05/01/2008 12:11
12.0 Windows Port-Braz asbrdcst.dll 320776 05/01/2008 12:11
12.0 Windows Japanese asbrdcst.dll 320776 05/01/2008 12:11
12.0 Windows Italian asbrdcst.dll 324872 05/01/2008 12:11
12.0 Windows German asbrdcst.dll 324872 05/01/2008 12:11
12.0 Windows French asbrdcst.dll 324872 05/01/2008 12:11
12.0 Windows Trad Chinese asbrdcst.dll 316680 05/01/2008 12:11
12.0 Windows Simp Chinese asbrdcst.dll 316680 05/01/2008 12:11
11.5 Windows English asbrdcst.dll 212992 04/22/2008 10:15:02
11.5 Windows Japanese asbrdcst.dll 208896 04/22/2008 14:28:52
11.5 Windows Simp Chinese asbrdcst.dll 204800 04/22/2008 14:30:54
11.5 Windows Trad Chinese asbrdcst.dll 204800 04/22/2008 14:33:28
11.5 Windows Italian asbrdcst.dll 212992 04/22/2008 14:31:46
11.5 Windows Port-Braz asbrdcst.dll 212992 04/22/2008 14:53:54
11.5 Windows German asbrdcst.dll 212992 04/22/2008 14:27:48
11.5 Windows French asbrdcst.dll 212992 04/22/2008 14:26:54
11.5 Windows Spanish asbrdcst.dll 212992 04/22/2008 14:32:38
11.1 Windows English asbrdcst.dll 204800 04/24/2008 11:21:26
11.1 Windows Japanese asbrdcst.dll 200704 04/24/2008 11:25:48
11.1 Windows Simp Chinese asbrdcst.dll 196608 04/24/2008 11:27:44
11.1 Windows Trad Chinese asbrdcst.dll 196608 04/24/2008 11:30:32
11.1 Windows Italian asbrdcst.dll 204800 04/24/2008 11:28:38
11.1 Windows Port-Braz asbrdcst.dll 204800 04/24/2008 11:38:52
11.1 Windows German asbrdcst.dll 204800 04/24/2008 11:24:38
11.1 Windows French asbrdcst.dll 204800 04/24/2008 11:23:38
11.1 Windows Spanish asbrdcst.dll 204800 04/24/2008 11:29:34
11.1 Windows Dutch asbrdcst.dll 204800 04/24/2008 11:33:24
11.1 Windows Polish asbrdcst.dll 204800 04/24/2008 11:38:02
11.1 Windows Russian asbrdcst.dll 204800 04/24/2008 11:39:44
11.1 Windows Turkish asbrdcst.dll 204800 04/24/2008 11:41:28
11.1 Windows Norwegian asbrdcst.dll 204800 04/24/2008 11:37:12
11.1 Windows Danish asbrdcst.dll 204800 04/24/2008 11:32:28
11.1 Windows Czech asbrdcst.dll 204800 04/24/2008 11:31:28
11.1 Windows Hungarian asbrdcst.dll 204800 04/24/2008 11:36:22
11.1 Windows Swedish asbrdcst.dll 204800 04/24/2008 11:40:38
11.1 Windows Finnish asbrdcst.dll 204800 04/24/2008 11:34:40
11.1 Windows Greek asbrdcst.dll 204800 04/24/2008 11:35:32
11.1 Netware English asbrdcst.dll 204800 04/24/2008 11:21:26
Workaround: As a temporary workaround, stop and disable the CA
ARCserve Discovery service. With the service disabled, deploying
agents using Auto-discovery will not work.
References (URLs may wrap):
CA Support:
http://support.ca.com/
Security Notice for CA ARCserve Discovery Service
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=178937
Solution Document Reference APARs:
QO99574, QO99575, QO99129, QO99576, QO99579
CA Security Response Blog posting:
CA ARCserve Backup Discovery Service Denial of Service Vulnerability
http://community.ca.com/blogs/casecurityresponseblog/archive/2008/06/18.aspx
Reported By:
Luigi Auriemma
http://aluigi.altervista.org/adv/carcbackazz-adv.txt
CVE References:
CVE-2008-1979 - casdscsvc denial of service
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1979
OSVDB References: Pending
http://osvdb.org/
Changelog for this advisory:
v1.0 - Initial Release
Customers who require additional information should contact CA
Technical Support at http://support.ca.com.
For technical questions or comments related to this advisory,
please send email to vuln AT ca DOT com.
If you discover a vulnerability in CA products, please report your
findings to our product security response team.
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782
Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research
CA, 1 CA Plaza, Islandia, NY 11749
Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2008 CA. All rights reserved.
{"id": "SECURITYVULNS:DOC:20063", "bulletinFamily": "software", "title": "CA ARCserve Backup Discovery Service Denial of Service Vulnerability", "description": "\r\nTitle: CA ARCserve Backup Discovery Service Denial of Service \r\nVulnerability\r\n\r\n\r\nCA Advisory Date: 2008-06-17\r\n\r\n\r\nReported By: Luigi Auriemma\r\n\r\n\r\nImpact: A remote attacker can cause a denial of service.\r\n\r\n\r\nSummary: CA ARCserve Backup contains a vulnerability in the \r\nDiscovery service (casdscsvc) that can allow a remote attacker to \r\ncause a denial of service condition. CA has issued patches to \r\naddress the vulnerability. The vulnerability, CVE-2008-1979, \r\noccurs due to insufficient verification of client data. An \r\nattacker can make a request that can crash the service.\r\n\r\n\r\nMitigating Factors: None\r\n\r\n\r\nSeverity: CA has given this vulnerability a Medium risk rating.\r\n\r\n\r\nAffected Products:\r\nCA ARCserve Backup r12.0 Windows\r\nCA ARCserve Backup r11.5 Windows SP3 and prior*\r\nCA ARCserve Backup r11.1 Windows*\r\nCA ARCserve Backup r11.1 Netware*\r\nCA Server Protection Suite r2\r\nCA Business Protection Suite r2\r\nCA Business Protection Suite for Microsoft Small Business Server \r\n Standard Edition r2\r\nCA Business Protection Suite for Microsoft Small Business Server \r\n Premium Edition r2\r\n\r\n*Formerly known as BrightStor ARCserve Backup\r\n\r\n\r\nNon-affected Products:\r\nCA ARCserve Backup r11.5 Windows SP4\r\n\r\n\r\nAffected Platforms:\r\nWindows and Netware\r\n\r\n\r\nStatus and Recommendation:\r\nCA has issued the following patches to address the \r\nvulnerabilities. \r\nCA ARCserve Backup r12.0 Windows: QO99574\r\nCA ARCserve Backup r11.5 Windows: QO99575\r\nFor CA ARCserve Backup r11.5 Windows, the issue can also be \r\naddressed by applying 11.5 SP4: QO99129\r\nCA ARCserve Backup r11.1 Windows: QO99576\r\nCA ARCserve Backup r11.1 Netware: QO99579\r\nCA Protection Suites r2: QO99575\r\n\r\n\r\nHow to determine if you are affected:\r\n\r\nCA ARCserve Backup r12.0 Windows:\r\n\r\n1. Run the ARCserve Patch Management utility. From the Windows \r\n Start menu, it can be found under Programs->CA->ARCserve Patch \r\n Management->Patch Status.\r\n2. The main patch status screen will indicate if patch \u201cQO99574\u201d \r\n is currently applied. If the patch is not applied, the \r\n installation is vulnerable.\r\n\r\nFor more information on the ARCserve Patch Management utility, \r\nread document TEC446265.\r\n\r\nAlternatively, use the file information below to determine if the \r\nproduct installation is vulnerable.\r\n\r\nCA ARCserve Backup r12.0 Windows,\r\nCA ARCserve Backup r11.5 Windows,\r\nCA ARCserve Backup r11.1 Windows,\r\nCA ARCserve Backup r11.1 Netware,\r\nCA Protection Suites r2*:\r\n\r\n1. Using Windows Explorer, locate the file \u201casbrdcst.dll\u201d. By \r\n default, the file is located in the \r\n \u201cC:\Program Files\CA\SharedComponents\ARCserve Backup\CADS\u201d \r\n directory on 32 bit systems and \u201cC:\Program Files (x86)\CA\\r\n SharedComponents\ARCserve Backup\CADS\u201d on 64 bit systems.\r\n2. Right click on the file and select Properties.\r\n3. Select the General tab.\r\n4. If the file timestamp is earlier than indicated in the below \r\n table, the installation is vulnerable.\r\n\r\n* For Protection Suites r2, use the file timestamp for CA ARCserve \r\n Backup r11.5 English\r\n\r\nProduct Ver Product Lang File Name File Sz Timestamp\r\n (bytes)\r\n12.0 Windows English asbrdcst.dll 324872 05/01/2008 12:11\r\n12.0 Windows Spanish asbrdcst.dll 324872 05/01/2008 12:11\r\n12.0 Windows Port-Braz asbrdcst.dll 320776 05/01/2008 12:11\r\n12.0 Windows Japanese asbrdcst.dll 320776 05/01/2008 12:11\r\n12.0 Windows Italian asbrdcst.dll 324872 05/01/2008 12:11\r\n12.0 Windows German asbrdcst.dll 324872 05/01/2008 12:11\r\n12.0 Windows French asbrdcst.dll 324872 05/01/2008 12:11\r\n12.0 Windows Trad Chinese asbrdcst.dll 316680 05/01/2008 12:11\r\n12.0 Windows Simp Chinese asbrdcst.dll 316680 05/01/2008 12:11\r\n11.5 Windows English asbrdcst.dll 212992 04/22/2008 10:15:02\r\n11.5 Windows Japanese asbrdcst.dll 208896 04/22/2008 14:28:52\r\n11.5 Windows Simp Chinese asbrdcst.dll 204800 04/22/2008 14:30:54\r\n11.5 Windows Trad Chinese asbrdcst.dll 204800 04/22/2008 14:33:28\r\n11.5 Windows Italian asbrdcst.dll 212992 04/22/2008 14:31:46\r\n11.5 Windows Port-Braz asbrdcst.dll 212992 04/22/2008 14:53:54\r\n11.5 Windows German asbrdcst.dll 212992 04/22/2008 14:27:48\r\n11.5 Windows French asbrdcst.dll 212992 04/22/2008 14:26:54\r\n11.5 Windows Spanish asbrdcst.dll 212992 04/22/2008 14:32:38\r\n11.1 Windows English asbrdcst.dll 204800 04/24/2008 11:21:26\r\n11.1 Windows Japanese asbrdcst.dll 200704 04/24/2008 11:25:48\r\n11.1 Windows Simp Chinese asbrdcst.dll 196608 04/24/2008 11:27:44\r\n11.1 Windows Trad Chinese asbrdcst.dll 196608 04/24/2008 11:30:32\r\n11.1 Windows Italian asbrdcst.dll 204800 04/24/2008 11:28:38\r\n11.1 Windows Port-Braz asbrdcst.dll 204800 04/24/2008 11:38:52\r\n11.1 Windows German asbrdcst.dll 204800 04/24/2008 11:24:38\r\n11.1 Windows French asbrdcst.dll 204800 04/24/2008 11:23:38\r\n11.1 Windows Spanish asbrdcst.dll 204800 04/24/2008 11:29:34\r\n11.1 Windows Dutch asbrdcst.dll 204800 04/24/2008 11:33:24\r\n11.1 Windows Polish asbrdcst.dll 204800 04/24/2008 11:38:02\r\n11.1 Windows Russian asbrdcst.dll 204800 04/24/2008 11:39:44\r\n11.1 Windows Turkish asbrdcst.dll 204800 04/24/2008 11:41:28\r\n11.1 Windows Norwegian asbrdcst.dll 204800 04/24/2008 11:37:12\r\n11.1 Windows Danish asbrdcst.dll 204800 04/24/2008 11:32:28\r\n11.1 Windows Czech asbrdcst.dll 204800 04/24/2008 11:31:28\r\n11.1 Windows Hungarian asbrdcst.dll 204800 04/24/2008 11:36:22\r\n11.1 Windows Swedish asbrdcst.dll 204800 04/24/2008 11:40:38\r\n11.1 Windows Finnish asbrdcst.dll 204800 04/24/2008 11:34:40\r\n11.1 Windows Greek asbrdcst.dll 204800 04/24/2008 11:35:32\r\n11.1 Netware English asbrdcst.dll 204800 04/24/2008 11:21:26\r\n\r\n\r\nWorkaround: As a temporary workaround, stop and disable the CA \r\nARCserve Discovery service. With the service disabled, deploying \r\nagents using Auto-discovery will not work.\r\n\r\n\r\nReferences (URLs may wrap):\r\nCA Support:\r\nhttp://support.ca.com/\r\nSecurity Notice for CA ARCserve Discovery Service\r\nhttps://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=178937\r\nSolution Document Reference APARs:\r\nQO99574, QO99575, QO99129, QO99576, QO99579\r\nCA Security Response Blog posting:\r\nCA ARCserve Backup Discovery Service Denial of Service Vulnerability\r\nhttp://community.ca.com/blogs/casecurityresponseblog/archive/2008/06/18.aspx\r\nReported By: \r\nLuigi Auriemma\r\nhttp://aluigi.altervista.org/adv/carcbackazz-adv.txt\r\nCVE References:\r\nCVE-2008-1979 - casdscsvc denial of service\r\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1979\r\nOSVDB References: Pending\r\nhttp://osvdb.org/\r\n\r\n\r\nChangelog for this advisory:\r\nv1.0 - Initial Release\r\n\r\n\r\nCustomers who require additional information should contact CA\r\nTechnical Support at http://support.ca.com.\r\n\r\nFor technical questions or comments related to this advisory, \r\nplease send email to vuln AT ca DOT com.\r\n\r\nIf you discover a vulnerability in CA products, please report your \r\nfindings to our product security response team.\r\nhttps://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782\r\n\r\n\r\nRegards,\r\nKen Williams ; 0xE2941985\r\nDirector, CA Vulnerability Research\r\n\r\n\r\nCA, 1 CA Plaza, Islandia, NY 11749\r\n \r\nContact http://www.ca.com/us/contact/\r\nLegal Notice http://www.ca.com/us/legal/\r\nPrivacy Policy http://www.ca.com/us/privacy/\r\nCopyright (c) 2008 CA. All rights reserved.", "published": "2008-06-19T00:00:00", "modified": "2008-06-19T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:20063", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2008-1979"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:26", "edition": 1, "viewCount": 46, "enchantments": {"score": {"value": 0.6, "vector": "NONE"}, "dependencies": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2008-289", "CPAI-2012-1341"]}, {"type": "cve", "idList": ["CVE-2008-1979"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:9099"]}], "rev": 4}, "backreferences": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2008-289", "CPAI-2012-1341"]}, {"type": "cve", "idList": ["CVE-2008-1979"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:9099"]}]}, "exploitation": null, "vulnersScore": 0.6}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1659919447, "score": 1659803227}, "_internal": {"score_hash": "5a45353204308afef43627663c655cbf"}}
{"checkpoint_advisories": [{"lastseen": "2021-12-17T12:41:20", "description": "Computer Associates' (CA) BrightStor ARCserve Backup and Business Protection Suite families of software offer data protection for distributed servers, clients, databases and applications. They provide centralized control over a series of distribution operations including Backup/Restore, Data Migration and Threat Management. There exists a denial of service vulnerability in CA ARCserve Backup Discovery service. The vulnerability is due to insufficient input validation by the Discovery service. A remote unauthenticated attacker may exploit this vulnerability by sending a crafted message to the target server. Successful attack could create a denial of service condition to the Discovery service. The affected ARCserve Backup Discovery service will terminate upon processing the malicious message. The service will restart automatically. If the attack is mounted continuously, a permanent denial-of-service condition could be created.", "cvss3": {}, "published": "2009-11-12T00:00:00", "type": "checkpoint_advisories", "title": "CA BrightStor ARCserve Backup Discovery Service Denial of Service (CVE-2008-1979)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-1979"], "modified": "2012-12-13T00:00:00", "id": "CPAI-2008-289", "href": "", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-08-02T18:42:05", "description": "There exists a denial of service vulnerability in CA ARCserve Backup Discovery service. The vulnerability is due to insufficient input validation by the Discovery service. A remote unauthenticated attacker may exploit this vulnerability by sending a crafted message to the target server. Successful attack could create a denial of service condition to the Discovery service.", "cvss3": {}, "published": "2013-01-08T00:00:00", "type": "checkpoint_advisories", "title": "CA BrightStor ARCserve Backup Discovery Service Buffer Over-Read (CVE-2008-1979)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-1979"], "modified": "2013-01-08T00:00:00", "id": "CPAI-2012-1341", "href": "", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "cve": [{"lastseen": "2022-03-23T12:06:10", "description": "The Discovery Service (casdscvc) in CA ARCserve Backup 12.0.5454.0 and earlier allows remote attackers to cause a denial of service (crash) via a packet with a large integer value used in an increment to TCP port 41523, which triggers a buffer over-read.", "cvss3": {}, "published": "2008-04-27T20:05:00", "type": "cve", "title": "CVE-2008-1979", "cwe": ["CWE-189"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-1979"], "modified": "2021-04-07T18:13:00", "cpe": ["cpe:/a:broadcom:brightstor_arcserve_backup:12.0.5454.0"], "id": "CVE-2008-1979", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1979", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:broadcom:brightstor_arcserve_backup:12.0.5454.0:*:*:*:*:*:*:*"]}], "securityvulns": [{"lastseen": "2018-08-31T11:09:30", "description": "Malformed request causes service to crash.", "edition": 1, "cvss3": {}, "published": "2008-06-19T00:00:00", "title": "CA ARCserve Backup Discovery Service DoS", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2008-1979"], "modified": "2008-06-19T00:00:00", "id": "SECURITYVULNS:VULN:9099", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9099", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}]}