Executive Summary
Summary | |
---|---|
Title | Computer Associates Anti-Virus engine fails to properly handle malformed CAB archives |
Informations | |||
---|---|---|---|
Name | VU#105105 | First vendor Publication | 2007-06-06 |
Vendor | VU-CERT | Last vendor Modification | 2007-06-06 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#105105Computer Associates Anti-Virus engine fails to properly handle malformed CAB archivesOverviewThe Computer Associates Anti-Virus engine contains a stack-based buffer overflow that may allow a remote, unauthenticated attacker to execute arbitrary code.I. DescriptionThe Computer Associates Anti-Virus engine contains a stack-based buffer overflow in the code responsible for processing CAB archives. Specifically, the Computer Associates Anti-Virus engine fails to properly validate the size of the coffFiles field in CAB archives before it is copied to a stack buffer. This may allow a stack-based buffer overflow to occur.This vulnerability affects numerous Computer Associates products, including:
II. ImpactA remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition..III. SolutionApply an UpdateAccording to the Computer Associates Security Notice issued June 5th, 2007:
Systems Affected
References
This vulnerability was reported by in Tipping Point advisory ZDI-07-035. This document was written by Jeff Gennari.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/105105 |
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
CA Antivirus engine CAB handling buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
35245 | CA Anti-Virus Engine CAB Header Parsing Overflow A buffer overflow exists in multiple CA products. The Anti-Virus engine fails to validate CAB files resulting in a stack overflow. With a specially crafted CAB file containing a malformed "coffFiles" field, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. |
35244 | CA Anti-Virus Engine CAB Archive Filename Parsing Overflow A buffer overflow exists in multiple CA products. The Anti-Virus engine fails to validate CAB archive files resulting in a stack overflow. With a specially crafted CAB containing a file with a long filename, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | CA multiple product AV engine CAB header parsing stack overflow attempt RuleID : 16719 - Revision : 8 - Type : FILE-OTHER |