exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Security Notice For CA Anti-Virus Engine

Security Notice For CA Anti-Virus Engine
Posted Oct 12, 2009
Authored by Ken Williams | Site www3.ca.com

CA's support is alerting customers to multiple security risks associated with CA Anti-Virus Engine. Vulnerabilities exist in the arclib component that can allow a remote attacker to cause a denial of service, or to cause heap corruption and potentially further compromise a system. CA has issued fixes to address the vulnerabilities.

tags | advisory, remote, denial of service, vulnerability, virus
advisories | CVE-2009-3587, CVE-2009-3588
SHA-256 | 1dc4058c8e774be29fddef6f172c726958c3daac8818e3613e4ed1638ebe3c6f

Security Notice For CA Anti-Virus Engine

Change Mirror Download

CA20091008-01: Security Notice for CA Anti-Virus Engine


Issued: October 8, 2009


CA's support is alerting customers to multiple security risks
associated with CA Anti-Virus Engine. Vulnerabilities exist in
the arclib component that can allow a remote attacker to cause a
denial of service, or to cause heap corruption and potentially
further compromise a system. CA has issued fixes to address the
vulnerabilities.

The first vulnerability, CVE-2009-3587, is due to improper
handling of a specially crafted RAR archive file by the CA
Anti-Virus engine arclib component. An attacker can create a
malformed RAR archive file that results in heap corruption and
allows the attacker to cause a denial of service or possibly
further compromise the system.

The second vulnerability, CVE-2009-3588, is due to improper
handling of a specially crafted RAR archive file by the CA
Anti-Virus engine arclib component. An attacker can create a
malformed RAR archive file that results in stack corruption and
allows the attacker to cause a denial of service.


Risk Rating

Medium


Platform

Windows
UNIX
Linux
Solaris
Mac OS X
Netware


Affected Products

CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1
CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8
CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8.1
CA Anti-Virus 2007 (v8)
CA Anti-Virus 2008
CA Anti-Virus 2009
CA Anti-Virus Plus 2009
eTrust EZ Antivirus r7.1
CA Internet Security Suite 2007 (v3)
CA Internet Security Suite 2008
CA Internet Security Suite Plus 2008
CA Internet Security Suite Plus 2009
CA Threat Manager for the Enterprise (formerly eTrust Integrated
Threat Management) r8
CA Threat Manager for the Enterprise (formerly eTrust Integrated
Threat Management) 8.1
CA Threat Manager Total Defense
CA Gateway Security r8.1
CA Protection Suites r2
CA Protection Suites r3
CA Protection Suites r3.1
CA Secure Content Manager (formerly eTrust Secure Content
Manager) 1.1
CA Secure Content Manager (formerly eTrust Secure Content
Manager) 8.0
CA Network and Systems Management (NSM) (formerly Unicenter
Network and Systems Management) r3.0
CA Network and Systems Management (NSM) (formerly Unicenter
Network and Systems Management) r3.1
CA Network and Systems Management (NSM) (formerly Unicenter
Network and Systems Management) r11
CA Network and Systems Management (NSM) (formerly Unicenter
Network and Systems Management) r11.1
CA ARCserve Backup r11.5 on Windows
CA ARCserve Backup r12 on Windows
CA ARCserve Backup r12.0 SP1 on Windows
CA ARCserve Backup r12.0 SP 2 on Windows
CA ARCserve Backup r12.5 on Windows
CA ARCserve Backup r11.1 Linux
CA ARCserve Backup r11.5 Linux
CA ARCserve for Windows Client Agent
CA ARCserve for Windows Server component
CA eTrust Intrusion Detection 2.0 SP1
CA eTrust Intrusion Detection 3.0
CA eTrust Intrusion Detection 3.0 SP1
CA Common Services (CCS) r3.1
CA Common Services (CCS) r11
CA Common Services (CCS) r11.1
CA Anti-Virus SDK (formerly eTrust Anti-Virus SDK)
CA Anti-Virus Gateway (formerly eTrust Antivirus Gateway) 7.1


Non-Affected Products

CA Anti-Virus engine with arclib version 8.1.4.0 or later
installed


How to determine if the installation is affected

For products on Windows:

1. Using Windows Explorer, locate the file "arclib.dll". By
default, the file is located in the
"C:\Program Files\CA\SharedComponents\ScanEngine" directory (*).
2. Right click on the file and select Properties.
3. Select the Version tab.
4. If the file version is earlier than indicated below, the
installation is vulnerable.

File Name File Version
arclib.dll 8.1.4.0

*For eTrust Intrusion Detection 2.0, the file is located in
"Program Files\eTrust\Intrusion Detection\Common", and for eTrust
Intrusion Detection 3.0 and 3.0 sp1, the file is located in
"Program Files\CA\Intrusion Detection\Common".

For CA Anti-Virus r8.1 on non-Windows platforms:

Use the compver utility provided on the CD to determine the
version of Arclib. If the version is less than 8.1.4.0, the
installation is vulnerable.

Example compver utility output:

------------------------------------------------
COMPONENT NAME VERSION
------------------------------------------------
eTrust Antivirus Arclib Archive Library 8.1.4.0
... (followed by other components)


For reference, the following are file names for arclib on
non-Windows operating systems:

Operating System File name
Solaris libarclib.so
Linux libarclib.so
Mac OS X arclib.bundle


Solution

CA released arclib 8.1.4.0 on August 12 2009. If your product is
configured for automatic updates, you should already be protected,
and you need to take no action. If your product is not configured
for automatic updates, then you simply need to run the update
utility included with your product.

CA Network and Systems Management (NSM) (formerly Unicenter
Network and Systems Management) r3.0: apply fix # RO11964.

CA Network and Systems Management (NSM) (formerly Unicenter
Network and Systems Management) r3.1: apply fix # RO11964.

CA Network and Systems Management (NSM) (formerly Unicenter
Network and Systems Management) r11: apply fix # RO11964.

CA Network and Systems Management (NSM) (formerly Unicenter
Network and Systems Management) r11.1: apply fix # RO11964.

CA Common Services (CCS) r3.1: apply fix # RO11954.

CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1
32bit: apply fix # RO10663.

CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1
IA64: apply fix # RO10664.

CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1
AMD64: apply fix # RO10665.

CA Secure Content Manager (formerly eTrust Secure Content Manager)
r1.1: apply fix # RO10999.

CA Secure Content Manager (formerly eTrust Secure Content Manager)
r8.0: apply fix # RO10999.

CA Anti-Virus Gateway (formerly eTrust Antivirus Gateway) 7.1:
apply fix # RO11000.

CA Gateway Security r8.1: RO10999.

CA ARCserve for Windows Server component installed on a 64 bit
machine: apply fixes # RO10663 and RO10664 (IA64) or RO10665
(AMD64).

CA ARCserve for Windows Server component installed on a 32 bit
machine: apply fix # RO10663.

CA ARCserve for Windows Client Agent installed on a 64 bit
machine: apply fix # RO10664 (IA64) or RO10665 (AMD64).

CA ARCserve for Windows Client Agent installed on a 32 bit
machine: apply fix # RO10663.

CA ARCserve for Linux Server r11.5: apply fix # RO10729.

CA ARCserve for Linux:

1. Download RO10729.tar.Z from RO10729 into a temporary location
/tmp/RO10729

2. Uncompress and untar RO10729.tar.Z as follows:
uncompress RO10729.tar.Z
tar -xvf RO10729.tar
The new "libarclib.so" will be extracted to /tmp/RO10729

3. Change the directory to $CAIGLBL0000/ino/config as follows:
cd $CAIGLBL0000/ino/config

4. Rename "libarclib.so" to "libarclib.so.RO10729" as follows:
mv libarclib.so libarclib.so.RO10729

5. Copy the new libarclib.so as follows:
cp /tmp/RO10729/libarclib.so $CAIGLBL0000/ino/config/

6. chmod +x $CAIGLBL0000/ino/config/libarclib.so

7. Stop the common agent (caagent stop)

8. Change the directory to ARCserve common agent directory
(typically /opt/CA/BABcmagt)
cd /opt/CA/BABcmagt
Note: To find out the agent home directory run the following
command:
dirname 'ls -l /usr/bin/caagent |cut -f2 -d">"'

9. Save a copy of libarclib.so
cp -p libarclib.so libarclib.so.RO10729

10. Copy over the new libarclib.so as follows:
cp $/tmp/RO10729/libarclib.so.

11. Start the common agent (caagent start)

12. Repeat steps (7-11) on all remote Linux client agents'
installations.

13. rm -rf /tmp/RO10729


Workaround

Do not open email attachments or download files from untrusted
sources.


References

CVE-2009-3587 - CA Anti-Virus RAR archive heap corruption
CVE-2009-3588 - CA Anti-Virus RAR archive stack corruption

CA20091008-01: Security Notice for CA Anti-Virus Engine
support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878


Acknowledgement

CVE-2009-3587 - Thierry Zoller - G-SEC - www.g-sec.lu
CVE-2009-3588 - Thierry Zoller - G-SEC - www.g-sec.lu


Change History

Version 1.0: Initial Release
Version 1.1: Updated list of affected products; added workaround.


If additional information is required, please contact CA Support
at http://support.ca.com/.


If you discover a vulnerability in CA products, please report your
findings to the CA Product Vulnerability Response Team.
support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782


Regards,
Ken Williams, Director ; 0xE2941985
CA Product Vulnerability Response Team


CA, 1 CA Plaza, Islandia, NY 11749

Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2009 CA. All rights reserved.
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close