exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 36976

Secunia Security Advisory 36976
Posted Oct 12, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in multiple CA products, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 086b51aea77c02a74d5e08cf673dfd930d41cf2267c392957e074268dde6ba61

Secunia Security Advisory 36976

Change Mirror Download
----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability
intelligence source on the market.

Implement it through Secunia.

For more information visit:
http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com

----------------------------------------------------------------------

TITLE:
CA Anti-Virus Engine RAR Processing Two Vulnerabilities

SECUNIA ADVISORY ID:
SA36976

VERIFY ADVISORY:
http://secunia.com/advisories/36976/

DESCRIPTION:
Two vulnerabilities have been reported in multiple CA products, which
can be exploited by malicious people to cause a DoS (Denial of
Service) or to potentially compromise a vulnerable system.

1) An error in the arclib component of the CA Anti-Virus engine can
be exploited to corrupt heap memory via a specially crafted RAR
archive.

Successful exploitation may allow execution of arbitrary code.

2) An error in the arclib component of the CA Anti-Virus engine can
be exploited to corrupt stack memory via a specially crafted RAR
archive and cause a crash.

The vulnerabilities are reported in the following products and
versions:
* CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1,
r8, and r8.1
* CA Anti-Virus 2007 (v8), 2008, and 2009
* CA Anti-Virus Plus 2009
* eTrust EZ Antivirus r7.1
* CA Internet Security Suite 2007 (v3) and 2008
* CA Internet Security Suite Plus 2008 and 2009
* CA Threat Manager for the Enterprise (formerly eTrust Integrated
Threat Management) r8 and 8.1
* CA Threat Manager Total Defense
* CA Gateway Security r8.1
* CA Protection Suites r2, r3, and r3.1
* CA Secure Content Manager (formerly eTrust Secure Content Manager)
1.1 and 8.0
* CA Network and Systems Management (NSM) (formerly Unicenter Network
and Systems Management) r3.0, r3.1, r11, and r11.1
* CA ARCserve Backup r11.5 on Windows, r12 on Windows, r12.0 SP1 on
Windows, r12.0 SP 2 on Windows, r12.5 on Windows, r11.1 Linux, and
r11.5 Linux
* CA ARCserve for Windows Client Agent
* CA ARCserve for Windows Server component
* CA eTrust Intrusion Detection 2.0 SP1, 3.0, and 3.0 SP1
* CA Common Services (CCS) r3.1, r11, and r11.1
* CA Anti-Virus SDK (formerly eTrust Anti-Virus SDK)
* CA Anti-Virus Gateway (formerly eTrust Antivirus Gateway) 7.1

SOLUTION:
The vulnerability is fixed in arclib.dll version 8.1.4.0, released
via automatic updates.

Please see the vendor's advisory for detailed instructions on
applying patches.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits Thierry Zoller.

ORIGINAL ADVISORY:
CA20091008-01:
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close