what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

n.runs-SA-2007.024.txt

n.runs-SA-2007.024.txt
Posted Jul 26, 2007
Authored by Sergio Alvarez | Site nruns.com

A denial of service vulnerability exists in CA eTrust Antivirus when parsing .CHM files. The vulnerability is present in CA eTrust Antivirus software previous to file arclib.dll version 7.3.0.9.

tags | advisory, denial of service
SHA-256 | 456f1593f1c7a4bd074c2182ce0fd75e3dc29468994fc5830bbb56719be5eff6

n.runs-SA-2007.024.txt

Change Mirror Download
n.runs AG             
http://www.nruns.com/ security(at)nruns.com
n.runs-SA-2007.024 25-Jul-2007
________________________________________________________________________

Vendor: Computer Associates, http://www.ca.com
Affected Products: CA eTrust Antivirus,
http://www3.ca.com/solutions/product.aspx?ID=156
Vulnerability: Infinite Loop DoS (remote)
Risk: HIGH

________________________________________________________________________

Vendor communication:

2007/05/09 Initial notification to CA
2007/05/11 CA Responses
2007/05/11 PGP keys exchange
2007/05/11 PoC files sent to CA
2007/05/15 CA ask for product and version used in the test
2007/05/15 Information requested sent to CA
2007/05/18 CA validates the vulnerabilities
2007/07/24 CA releases the Security Notice to the public
2007/07/25 n.runs AG releases a coordinated disclosure advisory
________________________________________________________________________

Overview:

Founded in 1976, CA today is a global company with headquarters in the
United States and 150 offices in more than 45 countries. They serve more
than 99% of Fortune 1000R companies, as well as government entities,
educational institutions and thousands of other companies in diverse
industries worldwide.
eTrust is an Antivirus developed by Computer Associates.
Combined with CA Anti-Spyware for the Enterprise, CA Anti-Virus for the
Enterprise provides efficient, centrally-managed, multi-layered protection
against a broad range of malware threats.

Description:

A remotely exploitable vulnerability has been found in the file parsing
engine.

In detail, the following flaw was determined:

- Infinite Loop in .CHM files parsing

Impact:

This problem can lead to remote engine denial-of-service if an attacker
carefully crafts a file that exploits the aforementioned vulnerability. The
vulnerability is present in CA eTrust Antivirus software previous to file
arclib.dll version 7.3.0.9.

Solution:

The vulnerability was reported on 09.May.2007 and an update has been issued
to solve this vulnerability through the regular update mechanism.
NOTE: Not all products are automatically updated; please refer to the
following link to validate:
http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.
asp
________________________________________________________________________

Credit:
Bugs found by Sergio Alvarez of n.runs AG.
________________________________________________________________________

References:
http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064895.html
http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.
asp

This Advisory and Upcoming Advisories:
http://www.nruns.com/security_advisory.php
http://www.nruns.com/parsing-engines-advisories.php
________________________________________________________________________

Unaltered electronic reproduction of this advisory is permitted. For all
other reproduction or publication, in printing or otherwise, contact
security@nruns.com for permission. Use of the advisory constitutes
acceptance for use in an "as is" condition. All warranties are excluded. In
no event shall n.runs be liable for any damages whatsoever including direct,
indirect, incidental, consequential, loss of business profits or special
damages, even if n.runs has been advised of the possibility of such damages.


Copyright 2007 n.runs AG. All rights reserved. Terms of apply.

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close