what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CA Security Advisory 34509

CA Security Advisory 34509
Posted Aug 18, 2006
Authored by Ken Williams, Computer Associates | Site ca.com

CAID 34509 - CA eTrust Antivirus WebScan versions 1.1.0.1047 and below are susceptible to arbitrary code execution flaws.

tags | advisory, arbitrary, code execution
SHA-256 | 4cae55691ffcf0223d655c47bdca23e5fc91998a767f9a7caacd4f4169d4c5ff

CA Security Advisory 34509

Change Mirror Download
 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title: CA eTrust Antivirus WebScan vulnerabilities

CA Vulnerability ID (CAID): 34509

CA Advisory Date: 2006-08-03

Discovered By:
Matt Murphy of the TippingPoint Security Research Team

Impact: Remote attacker can execute arbitrary code.

Summary: Ca eTrust Antivirus WebScan is a free, web-based virus
scanner that is located at
http://www3.ca.com/securityadvisor/virusinfo/scan.aspx. CA eTrust
Antivirus WebScan v1.1.0.1047 and earlier contains vulnerabilities
that can allow a remote attacker to execute arbitrary code or
compromise the integrity of the WebScan software. The first
vulnerability is due to a failure to properly validate parameters.
The second vulnerability is due to a buffer overflow in WebScan.
Matt Murphy has identified multiple attack vectors that exploit
these vulnerabilities.

Mitigating Factors: Exploitation of these vulnerabilities is
non-trivial.

Severity: CA has given this vulnerability a Medium risk rating.

Affected Products:
CA eTrust Antivirus WebScan v1.1.0.1047 and earlier

Affected platforms:
Internet Explorer 4.0 or above on Microsoft Windows

Status and Recommendation:
CA eTrust Antivirus WebScan v1.1.0.1048 addresses all of the
vulnerabilities.
Visit http://www3.ca.com/securityadvisor/virusinfo/scan.aspx and
allow Internet Explorer to install the new webscan.cab software.
Note that the software is digitally signed by CA.
Alternatively, you can simply remove an older, vulnerable object
by using one of these two methods:
a) Start Internet Explorer, and then select "Tools" > "Internet
Options" > "General" tab. On the "General" tab, click on the
"Settings" button in the "Temporary Internet Files" section. On
the "Settings" dialog window, click on the button labeled "View
Objects" and then right-click on the "WScanCtl Class" object and
select the "Remove" option.
b) Open an Explorer window and browse to
"<system>\downloaded program files". Then right-click on the
"WScanCtl Class" object and select the "Remove" option.

Determining if you are affected:
Browse to the C:\WINDOWS\Downloaded Program Files or
C:\WINNT\Downloaded Program Files folder and check the version
number of the "WScanCtl Class" object. If the version number is
less than 1,1,0,1048, you need to update the ActiveX control.
Another way to determine if you are affected is to Start Internet
Explorer, and then select "Tools" > "Internet Options" > "General"
tab. On the "General" tab, click on the "Settings" button in the
"Temporary Internet Files" section. On the "Settings" dialog
window, click on the button labeled "View Objects" and then check
the version of the "WScanCtl Class" object. If the version number
is less than 1,1,0,1048, you need to update the ActiveX control.

Note that v1.1.0.1045 is the last version that was widely
distributed.

References (URLs may wrap):
CA SupportConnect:
http://supportconnect.ca.com/
CAID: 34509
CAID Advisory link:
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34509
ZDI, founded by 3Com and TippingPoint:
http://www.zerodayinitiative.com/
CVE Reference: Pending
http://cve.mitre.org/
OSVDB Reference: Pending
http://osvdb.org/

Changelog for this advisory:
v1.0 - Initial Release

Customers who require additional information should contact CA
Technical Support at http://supportconnect.ca.com.

For technical questions or comments related to this advisory,
please send email to vuln@ca.com, or contact me directly.

If you discover a vulnerability in CA products, please report
your findings to vuln@ca.com, or utilize our "Submit a
Vulnerability" form.
URL: http://www3.ca.com/securityadvisor/vulninfo/submit.aspx


Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research


CA, One Computer Associates Plaza. Islandia, NY 11749

Contact http://www3.ca.com/contact/
Legal Notice http://www3.ca.com/legal/
Privacy Policy http://www3.ca.com/privacy/
Copyright C 2006 CA. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRNNxlnklkd/ilBmFEQJ3hQCfRiYEhSAg4FZOyxcjFaebiLT+OQgAoIpf
tmJq7klc8ZgJSDAwsGGL/r9r
=+twh
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close