exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

caid-34870.txt

caid-34870.txt
Posted Dec 14, 2006
Authored by Ken Williams | Site ca.com

Multiple instances of improper handling of NULL buffers in CA Anti-Virus allow local attackers to cause a denial of service condition. This issue affects only consumer CA Anti-Virus products.

tags | advisory, denial of service, local, virus
SHA-256 | 11819a7013b6e40a1cc760c94258674027e522f92b3b43914752ec599d4cbb9f

caid-34870.txt

Change Mirror Download

Title: CAID 34870: CA Anti-Virus vetfddnt.sys, vetmonnt.sys Local
Denial of Service Vulnerabilities

CA Vulnerability ID (CAID): 34870

CA Advisory Date: 2006-12-13

Discovered By: Rubén Santamarta (reversemode.com)

Impact: Local unprivileged attacker can cause a denial of service.

Summary: Multiple instances of improper handling of NULL buffers
in CA Anti-Virus allow local attackers to cause a denial of
service condition. This issue affects only consumer CA Anti-Virus
products.

Mitigating Factors: Valid user account is required for successful
attack.

Severity: CA has given this vulnerability issue a Low risk rating.

Affected Products:
Consumer Products:
CA Anti-Virus 2007 v8.1
CA Anti-Virus for Vista Beta v8.2
CA Internet Security Suite 2007 v3.0

Affected platforms:
Microsoft Windows

Status and Recommendation:
CA has addressed this issue in the GA (Generally Available)
software by providing a new automatic update on December 13, 2006.
Customers running one of the GA products simply need to ensure
that they have allowed this automatic update to take place. For
CA Anti-Virus for Vista Beta, this issue will be patched in the GA
release of the software.

Determining if you are affected:
View the Help>About screen and confirm that the product version is
8.3.0.1 or above. You can also verify application of the update
by confirming that the vetfddnt.sys and vetmonnt.sys driver
versions are 8.3.0.1 or above. These files are located in the
%windows%\system32\drivers folder.

References (URLs may wrap):
CA SupportConnect:
http://supportconnect.ca.com/
CA SupportConnect Security Notice for this vulnerability:
N/A
CA Consumer Support Security Notice for this vulnerability:
Low Risk CA Anti-Virus Vulnerability - Multiple Local Denial of
Service
http://crm.my-etrust.com/login.asp?username=guest&target=DOCUMENT&openparameter=2651
Solution Document Reference APARs:
N/A
CA Security Advisor posting:
CA Anti-Virus vetfddnt.sys, vetmonnt.sys Local Denial of Service
Vulnerabilities
http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=96883
CAID: 34870
CAID Advisory links:
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34870
Discoverer: Rubén Santamarta, Reverse Mode
http://www.reversemode.com/
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=41
CVE Reference: CVE-2006-6496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6496
OSVDB Reference: OSVDB ID: 30845
http://osvdb.org/30845

Changelog for this advisory:
v1.0 - Initial Release

Customers who require additional information should contact CA
Technical Support at http://supportconnect.ca.com.

For technical questions or comments related to this advisory,
please send email to vuln@ca.com, or contact me directly.

If you discover a vulnerability in CA products, please report
your findings to vuln@ca.com, or utilize our "Submit a
Vulnerability" form.
URL: http://www3.ca.com/securityadvisor/vulninfo/submit.aspx


Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research

CA, One CA Plaza. Islandia, NY 11749

Contact http://www3.ca.com/contact/
Legal Notice http://www3.ca.com/legal/
Privacy Policy http://www3.ca.com/privacy/
Copyright © 2006 CA. All rights reserved.
Login or Register to add favorites

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    11 Files
  • 30
    May 30th
    46 Files
  • 31
    May 31st
    15 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close