|
|
|
|
| |
Credit:
The information has been provided by ZDI-07-035.
The original article can be found at:
http://www.zerodayinitiative.com/advisories/ZDI-07-035.html
Related article can be found at:
http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp
|
| |
Affected Products:
* CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8, r8.1
* CA Anti-Virus 2007 (v8)
* eTrust EZ Antivirus r7, r6.1
* CA Internet Security Suite 2007 (v3)
* eTrust Internet Security Suite r1, r2
* eTrust EZ Armor r1, r2, r3.x
* CA Threat Manager for the Enterprise (formerly eTrust Integrated Threat Management) r8
* CA Protection Suites r2, r3
* CA Secure Content Manager (formerly eTrust Secure Content Manager) 8.0
* CA Anti-Virus Gateway (formerly eTrust Antivirus eTrust Antivirus Gateway) 7.1
* Unicenter Network and Systems Management (NSM) r3.0
* Unicenter Network and Systems Management (NSM) r3.1
* Unicenter Network and Systems Management (NSM) r11
* Unicenter Network and Systems Management (NSM) r11.1
* BrightStor ARCserve Backup r11.5
* BrightStor ARCserve Backup r11.1
* BrightStor ARCserve Backup r11 for Windows
* BrightStor Enterprise Backup r10.5
* BrightStor ARCserve Backup v9.01
* CA Common Services
* CA Anti-Virus SDK (formerly eTrust Anti-Virus SDK)
The specific flaw exists within the processing of an improperly defined "coffFiles" field in .CAB archives. Large values result in an unbounded data copy operation which can result in an exploitable stack-based buffer overflow.
Vendor Status:
Computer Associates has issued an update to correct this vulnerability. More details can be found at:
http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp
CVE Information:
CVE-2007-2864
Disclosure Timeline:
* 2007.02.16 - Vulnerability reported to vendor
* 2007.06.05 - Coordinated public release of advisory
|
|
|
|
|