what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CA Security Advisory 34509

CA Security Advisory 34509
Posted Aug 18, 2006
Authored by Ken Williams, Computer Associates | Site ca.com

CAID 34509 - CA eTrust Antivirus WebScan versions 1.1.0.1047 and below are susceptible to arbitrary code execution flaws.

tags | advisory, arbitrary, code execution
SHA-256 | 4cae55691ffcf0223d655c47bdca23e5fc91998a767f9a7caacd4f4169d4c5ff

CA Security Advisory 34509

Change Mirror Download
 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title: CA eTrust Antivirus WebScan vulnerabilities

CA Vulnerability ID (CAID): 34509

CA Advisory Date: 2006-08-03

Discovered By:
Matt Murphy of the TippingPoint Security Research Team

Impact: Remote attacker can execute arbitrary code.

Summary: Ca eTrust Antivirus WebScan is a free, web-based virus
scanner that is located at
http://www3.ca.com/securityadvisor/virusinfo/scan.aspx. CA eTrust
Antivirus WebScan v1.1.0.1047 and earlier contains vulnerabilities
that can allow a remote attacker to execute arbitrary code or
compromise the integrity of the WebScan software. The first
vulnerability is due to a failure to properly validate parameters.
The second vulnerability is due to a buffer overflow in WebScan.
Matt Murphy has identified multiple attack vectors that exploit
these vulnerabilities.

Mitigating Factors: Exploitation of these vulnerabilities is
non-trivial.

Severity: CA has given this vulnerability a Medium risk rating.

Affected Products:
CA eTrust Antivirus WebScan v1.1.0.1047 and earlier

Affected platforms:
Internet Explorer 4.0 or above on Microsoft Windows

Status and Recommendation:
CA eTrust Antivirus WebScan v1.1.0.1048 addresses all of the
vulnerabilities.
Visit http://www3.ca.com/securityadvisor/virusinfo/scan.aspx and
allow Internet Explorer to install the new webscan.cab software.
Note that the software is digitally signed by CA.
Alternatively, you can simply remove an older, vulnerable object
by using one of these two methods:
a) Start Internet Explorer, and then select "Tools" > "Internet
Options" > "General" tab. On the "General" tab, click on the
"Settings" button in the "Temporary Internet Files" section. On
the "Settings" dialog window, click on the button labeled "View
Objects" and then right-click on the "WScanCtl Class" object and
select the "Remove" option.
b) Open an Explorer window and browse to
"<system>\downloaded program files". Then right-click on the
"WScanCtl Class" object and select the "Remove" option.

Determining if you are affected:
Browse to the C:\WINDOWS\Downloaded Program Files or
C:\WINNT\Downloaded Program Files folder and check the version
number of the "WScanCtl Class" object. If the version number is
less than 1,1,0,1048, you need to update the ActiveX control.
Another way to determine if you are affected is to Start Internet
Explorer, and then select "Tools" > "Internet Options" > "General"
tab. On the "General" tab, click on the "Settings" button in the
"Temporary Internet Files" section. On the "Settings" dialog
window, click on the button labeled "View Objects" and then check
the version of the "WScanCtl Class" object. If the version number
is less than 1,1,0,1048, you need to update the ActiveX control.

Note that v1.1.0.1045 is the last version that was widely
distributed.

References (URLs may wrap):
CA SupportConnect:
http://supportconnect.ca.com/
CAID: 34509
CAID Advisory link:
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34509
ZDI, founded by 3Com and TippingPoint:
http://www.zerodayinitiative.com/
CVE Reference: Pending
http://cve.mitre.org/
OSVDB Reference: Pending
http://osvdb.org/

Changelog for this advisory:
v1.0 - Initial Release

Customers who require additional information should contact CA
Technical Support at http://supportconnect.ca.com.

For technical questions or comments related to this advisory,
please send email to vuln@ca.com, or contact me directly.

If you discover a vulnerability in CA products, please report
your findings to vuln@ca.com, or utilize our "Submit a
Vulnerability" form.
URL: http://www3.ca.com/securityadvisor/vulninfo/submit.aspx


Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research


CA, One Computer Associates Plaza. Islandia, NY 11749

Contact http://www3.ca.com/contact/
Legal Notice http://www3.ca.com/legal/
Privacy Policy http://www3.ca.com/privacy/
Copyright C 2006 CA. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRNNxlnklkd/ilBmFEQJ3hQCfRiYEhSAg4FZOyxcjFaebiLT+OQgAoIpf
tmJq7klc8ZgJSDAwsGGL/r9r
=+twh
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    11 Files
  • 30
    May 30th
    46 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close