CVE-2006-0306
Summary
| CVE | CVE-2006-0306 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-01-19 00:03:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | The DM Primer (dmprimer.exe) in the DM Deployment Common Component in Computer Associates (CA) BrightStor Mobile Backup r4.0, BrightStor ARCserve Backup for Laptops & Desktops r11.0, r11.1, r11.1 SP1, Unicenter Remote Control 6.0, 6.0 SP1, CA Desktop Protection Suite r2, CA Server Protection Suite r2, and CA Business Protection Suite r2 allows remote attackers to cause a denial of service (CPU consumption or application hang) via a large network packet, which causes a WSAEMESGSIZE error code that is not handled, leading to a thread exit. |
Risk And Classification
Primary CVSS: v2.0 5 from [email protected]
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS: 0.156240000 probability, percentile 0.947090000 (date 2026-04-16)
Problem Types: CWE-399 | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
PartialAV:N/AC:L/Au:N/C:N/I:N/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Broadcom | Brightstor Arcserve Backup Laptops Desktops | 11.0 | All | All | All |
| Application | Broadcom | Brightstor Arcserve Backup Laptops Desktops | 11.1 | All | All | All |
| Application | Broadcom | Brightstor Arcserve Backup Laptops Desktops | 11.1 | sp1 | All | All |
| Application | Broadcom | Brightstor Mobile Backup | r4.0 | All | All | All |
| Application | Broadcom | Business Protection Suite | 2.0 | All | All | All |
| Application | Broadcom | Desktop Protection Suite | 2.0 | All | All | All |
| Application | Broadcom | Server Protection Suite | 2 | All | All | All |
| Application | Broadcom | Unicenter Remote Control | 5.2 | All | All | All |
| Application | Broadcom | Unicenter Remote Control | 6.0 | All | All | All |
| Application | Broadcom | Unicenter Remote Control | 6.0 | sp1 | All | All |
| Application | Ca | Unicenter Remote Control | 6.0 | sp1 | All | en |
| Application | Ca | Unicenter Remote Control | 6.0 | sp1 | All | fr |
| Application | Ca | Unicenter Remote Control | 6.0_build_6.0.56.3 | All | All | en |
| Application | Ca | Unicenter Remote Control | 6.0_build_6.0.74 | All | All | de |
| Application | Ca | Unicenter Remote Control | 6.0_build_6.0.74 | All | All | en |
| Application | Ca | Unicenter Remote Control | 6.0_build_6.0.74 | All | All | fr |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Error handling weakness in DM Primer Service | af854a3a-2127-422b-91ae-364da2661108 | www.designfolks.com.au | Vendor Advisory, URL Repurposed |
| SecurityTracker.com Archives - DM Deployment Common Component (DMPrimer) Lets Remote Users Deny Service | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| Secunia - Advisories - CA DM Deployment Common Component Denial of Service | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Computer Associates Unicenter Remote Control DM Primer Remote Denial of Service Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Exploit |
| SupportConnect - DM Deployment Common Component Security Notice | af854a3a-2127-422b-91ae-364da2661108 | supportconnectw.ca.com | Vendor Advisory |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| www.osvdb.org/22529 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| CA DM Deployment Common Component DM Primer vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www3.ca.com | Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.