exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CA Security Advisory 35330

CA Security Advisory 35330
Posted May 12, 2007
Authored by Ken Williams, Computer Associates | Site www3.ca.com

CA Anti-Virus for the Enterprise, CA Threat Manager, and CA Anti-Spyware contain multiple vulnerabilities that can allow an attacker to cause a denial of service or possibly execute arbitrary code. CA has issued patches to address the vulnerabilities.

tags | advisory, denial of service, arbitrary, vulnerability, virus
advisories | CVE-2007-2522, CVE-2007-2523
SHA-256 | 8f199a847ae100657c96161091769e0883d36aa803d130e150619b62423ebc0c

CA Security Advisory 35330

Change Mirror Download

Title: [CAID 35330, 35331]: CA Anti-Virus, CA Threat Manager, and
CA Anti-Spyware Console Login and File Mapping Vulnerabilities

CA Vuln ID (CAID): 35330, 35331

CA Advisory Date: 2007-05-09

Reported By: ZDI, iDefense

Impact: Attackers can cause a denial of service or potentially
execute arbitrary code.

Summary: CA Anti-Virus for the Enterprise, CA Threat Manager, and
CA Anti-Spyware contain multiple vulnerabilities that can allow an
attacker to cause a denial of service or possibly execute
arbitrary code. CA has issued patches to address the
vulnerabilities.

The first vulnerability, CVE-2007-2522, is due to insufficient
bounds checking on Console Server login credentials. A remote
attacker can use carefully constructed authentication credentials
to cause a stack based buffer overflow, which can potentially
result in arbitrary code execution.

The second vulnerability, CVE-2007-2523, is due to insufficient
bounds checking in InoCore.dll. A local attacker can modify the
contents of a file mapping to cause a stack based buffer overflow,
which can potentially result in arbitrary code execution. This
issue only affects CA Anti-Virus for the Enterprise and CA Threat
Manager.

Mitigating Factors: For CVE-2007-2522, the vulnerability applies
only to an installation on the x86 platform with the Console
Server installed.

Severity: CA has given these vulnerabilities a combined High risk
rating.

Affected Products:
CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8
CA Threat Manager (formerly eTrust Integrated Threat Management) r8
CA Anti-Spyware for the Enterprise (formerly eTrust PestPatrol) r8
CA Protection Suites r3

Affected Platforms:
Windows

Status and Recommendation:
CA has issued an update to address the vulnerabilities. The
patched files are available as part of the product's automatic
content update. The following components must be enabled in order
to receive these updates: eTrust ITM Console Server must be
enabled to receive InoWeb.exe updates, and eTrust ITM Common must
be enabled to receive InoCore.dll updates.

How to determine if the installation is affected:
1. Using Windows Explorer, locate the files "InoWeb.exe" and
"InoCore.dll". By default, the files are located in the
"C:\Program Files\CA\eTrustITM" directory.
2. Right click on each of the files and select Properties.
3. Select the Version tab (or the Details tab if you are using
Windows Vista).
4. If either file version is earlier than indicated below, the
installation is vulnerable.
File Name File Version
InoWeb.exe 8.0.448.0
InoTask.dll 8.0.448.0

Workaround:
In situations where updating the product is not immediately
feasible, the following workaround can be used as a temporary
measure to reduce exposure.

For CVE-2007-2522, filter access to TCP port 12168.

References (URLs may wrap):
CA SupportConnect:
http://supportconnect.ca.com/
CA SupportConnect Security Notice for this vulnerability:
Security Notice for CA Anti-Virus for the Enterprise, CA Threat
Manager, and CA Anti-Spyware
http://supportconnectw.ca.com/public/antivirus/infodocs/caav-secnotice050807.asp
CA Security Advisor posting:
CA Anti-Virus, CA Threat Manager, and CA Anti-Spyware Console
Login and File Mapping Vulnerabilities
http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=139626
CAID: 35330, 35331
CAID Advisory links:
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35330
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35331
Reported By: iDefense
iDefense Advisory: 05.09.07 : Computer Associates eTrust
InoTask.exe Antivirus Buffer Overflow Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=530
Reported By: ZDI
ZDI Advisory: ZDI-07-028
http://www.zerodayinitiative.com/advisories/ZDI-07-028.html
CVE References: CVE-2007-2522, CVE-2007-2523
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2522
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2523
OSVDB References: OSVDB-34585, OSVDB-34586
http://osvdb.org/34585
http://osvdb.org/34586

Changelog for this advisory:
v1.0 - Initial Release

Customers who require additional information should contact CA
Technical Support at http://supportconnect.ca.com.

For technical questions or comments related to this advisory,
please send email to vuln AT ca DOT com.

If you discover a vulnerability in CA products, please report your
findings to vuln AT ca DOT com, or utilize our "Submit a
Vulnerability" form.
URL: http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx


Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research

CA, 1 CA Plaza, Islandia, NY 11749

Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2007 CA. All rights reserved.
Login or Register to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close