|
|
|
|
| |
Credit:
The information has been provided by CA Security Advisory.
The original article can be found at:
http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=139626
|
| |
Affected Products:
* CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8
* CA Threat Manager (formerly eTrust Integrated Threat Management) r8
* CA Anti-Spyware for the Enterprise (formerly eTrust PestPatrol) r8
* CA Protection Suites r3
The first vulnerability, CVE-2007-2522, is due to insufficient bounds checking on Console Server login credentials. A remote attacker can use carefully constructed authentication credentials to cause a stack based buffer overflow, which can potentially result in arbitrary code execution.
The second vulnerability, CVE-2007-2523, is due to insufficient bounds checking in InoCore.dll. A local attacker can modify the contents of a file mapping to cause a stack based buffer overflow, which can potentially result in arbitrary code execution. This issue only affects CA Anti-Virus for the Enterprise and CA Threat Manager.
CA has given these vulnerabilities a combined High risk rating.
Mitigating Factors:
For CVE-2007-2522, the vulnerability applies only to an installation on the x86 platform with the Console Server installed.
CVE Information:
CVE-2007-2522
CVE-2007-2523
Vendor Status:
CA has issued an update to address the vulnerabilities. The patched files are available as part of the product's automatic content update. The following components must be enabled in order to receive these updates: eTrust ITM Console Server must be enabled to receive InoWeb.exe updates, and eTrust ITM Common must be enabled to receive InoCore.dll updates.
|
|
|
|
|