Vulnerabilites related to ca - gateway_security
cve-2009-3587
Vulnerability from cvelistv5
Published
2009-10-13 10:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588.
References
▼ | URL | Tags |
---|---|---|
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878 | x_refsource_CONFIRM | |
http://osvdb.org/58691 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/36976 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1022999 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2009/2852 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/53697 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/507068/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/36653 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "58691", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/58691" }, { "name": "36976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "ca-rar-code-execution(53697)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "58691", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/58691" }, { "name": "36976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "ca-rar-code-execution(53697)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3587", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878", "refsource": "CONFIRM", "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "58691", "refsource": "OSVDB", "url": "http://osvdb.org/58691" }, { "name": "36976", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "ca-rar-code-execution(53697)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36653" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3587", "datePublished": "2009-10-13T10:00:00", "dateReserved": "2009-10-08T00:00:00", "dateUpdated": "2024-08-07T06:31:10.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0758
Vulnerability from cvelistv5
Published
2011-02-10 17:00
Modified
2024-08-06 22:05
Severity ?
EPSS score ?
Summary
The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46253 | vdb-entry, x_refsource_BID | |
http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca | x_refsource_MISC | |
http://secunia.com/advisories/43200 | third-party-advisory, x_refsource_SECUNIA | |
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BEE6F16E1-6E05-4890-A739-2B9F745C721F%7D | x_refsource_CONFIRM | |
http://www.zerodayinitiative.com/advisories/ZDI-11-059 | x_refsource_MISC | |
http://www.securitytracker.com/id?1025052 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/8075 | third-party-advisory, x_refsource_SREASON | |
http://osvdb.org/70840 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/archive/1/516277/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2011/0306 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:05:53.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46253", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46253" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca" }, { "name": "43200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43200" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BEE6F16E1-6E05-4890-A739-2B9F745C721F%7D" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-059" }, { "name": "1025052", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025052" }, { "name": "8075", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8075" }, { "name": "70840", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70840" }, { "name": "20110207 ZDI-11-059: CA ETrust Secure Content Manager Common Services Transport Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516277/100/0/threaded" }, { "name": "ADV-2011-0306", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0306" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46253", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46253" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca" }, { "name": "43200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43200" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BEE6F16E1-6E05-4890-A739-2B9F745C721F%7D" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-059" }, { "name": "1025052", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025052" }, { "name": "8075", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8075" }, { "name": "70840", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70840" }, { "name": "20110207 ZDI-11-059: CA ETrust Secure Content Manager Common Services Transport Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516277/100/0/threaded" }, { "name": "ADV-2011-0306", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0306" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46253", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46253" }, { "name": "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca" }, { "name": "43200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43200" }, { "name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={EE6F16E1-6E05-4890-A739-2B9F745C721F}", "refsource": "CONFIRM", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={EE6F16E1-6E05-4890-A739-2B9F745C721F}" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-059", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-059" }, { "name": "1025052", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025052" }, { "name": "8075", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8075" }, { "name": "70840", "refsource": "OSVDB", "url": "http://osvdb.org/70840" }, { "name": "20110207 ZDI-11-059: CA ETrust Secure Content Manager Common Services Transport Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516277/100/0/threaded" }, { "name": "ADV-2011-0306", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0306" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0758", "datePublished": "2011-02-10T17:00:00", "dateReserved": "2011-02-02T00:00:00", "dateUpdated": "2024-08-06T22:05:53.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3588
Vulnerability from cvelistv5
Published
2009-10-13 10:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/53698 | vdb-entry, x_refsource_XF | |
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878 | x_refsource_CONFIRM | |
http://secunia.com/advisories/36976 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1022999 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2009/2852 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/507068/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/36653 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ca-rar-dos(53698)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53698" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "36976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ca-rar-dos(53698)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53698" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "36976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3588", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ca-rar-dos(53698)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53698" }, { "name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878", "refsource": "CONFIRM", "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "36976", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36653" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3588", "datePublished": "2009-10-13T10:00:00", "dateReserved": "2009-10-08T00:00:00", "dateUpdated": "2024-08-07T06:31:10.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2667
Vulnerability from cvelistv5
Published
2011-07-28 22:00
Modified
2024-08-06 23:08
Severity ?
EPSS score ?
Summary
Icihttp.exe in CA Gateway Security for HTTP, as used in CA Gateway Security 8.1 before 8.1.0.69 and CA Total Defense r12, does not properly parse URLs, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and daemon crash) via a malformed request.
References
▼ | URL | Tags |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-11-237/ | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/518935/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1025812 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/8316 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/518934/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/48813 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68736 | vdb-entry, x_refsource_XF | |
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7B5E404992-6B58-4C44-A29D-027D05B6285D%7D | x_refsource_CONFIRM | |
http://securitytracker.com/id?1025813 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/45332 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:08:23.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-237/" }, { "name": "20110720 CA20110720-01: Security Notice for CA Gateway Security and Total Defense", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518935/100/0/threaded" }, { "name": "1025812", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025812" }, { "name": "8316", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8316" }, { "name": "20110720 ZDI-11-237: CA Total Defense Suite Gateway Security Malformed HTTP Packet Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518934/100/0/threaded" }, { "name": "48813", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48813" }, { "name": "totaldefense-gateway-url-code-execution(68736)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68736" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7B5E404992-6B58-4C44-A29D-027D05B6285D%7D" }, { "name": "1025813", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025813" }, { "name": "45332", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45332" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Icihttp.exe in CA Gateway Security for HTTP, as used in CA Gateway Security 8.1 before 8.1.0.69 and CA Total Defense r12, does not properly parse URLs, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and daemon crash) via a malformed request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-237/" }, { "name": "20110720 CA20110720-01: Security Notice for CA Gateway Security and Total Defense", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518935/100/0/threaded" }, { "name": "1025812", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025812" }, { "name": "8316", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8316" }, { "name": "20110720 ZDI-11-237: CA Total Defense Suite Gateway Security Malformed HTTP Packet Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518934/100/0/threaded" }, { "name": "48813", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48813" }, { "name": "totaldefense-gateway-url-code-execution(68736)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68736" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7B5E404992-6B58-4C44-A29D-027D05B6285D%7D" }, { "name": "1025813", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025813" }, { "name": "45332", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45332" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2667", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icihttp.exe in CA Gateway Security for HTTP, as used in CA Gateway Security 8.1 before 8.1.0.69 and CA Total Defense r12, does not properly parse URLs, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and daemon crash) via a malformed request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-237/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-237/" }, { "name": "20110720 CA20110720-01: Security Notice for CA Gateway Security and Total Defense", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518935/100/0/threaded" }, { "name": "1025812", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1025812" }, { "name": "8316", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8316" }, { "name": "20110720 ZDI-11-237: CA Total Defense Suite Gateway Security Malformed HTTP Packet Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518934/100/0/threaded" }, { "name": "48813", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48813" }, { "name": "totaldefense-gateway-url-code-execution(68736)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68736" }, { "name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={5E404992-6B58-4C44-A29D-027D05B6285D}", "refsource": "CONFIRM", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={5E404992-6B58-4C44-A29D-027D05B6285D}" }, { "name": "1025813", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1025813" }, { "name": "45332", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45332" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2667", "datePublished": "2011-07-28T22:00:00", "dateReserved": "2011-07-06T00:00:00", "dateUpdated": "2024-08-06T23:08:23.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2009-10-13 10:30
Modified
2024-11-21 01:07
Severity ?
Summary
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:anti-virus:2007:8:*:*:*:*:*:*", "matchCriteriaId": "C469EBBE-EE96-4CED-BD8C-36461750C6A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus:2008:*:*:*:*:*:*:*", "matchCriteriaId": "9C5E892B-0EE8-4B76-97B8-0BAF17E83F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "607CCBDA-7288-4496-A7ED-EF6DED40CA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:r8:*:*:*:*:*:*:*", "matchCriteriaId": "11BCD267-E8CE-4A97-B769-5F4CAF9830D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "865B7BD2-3AD1-41CA-842B-47BC4F1426DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*", "matchCriteriaId": "0E2FA702-184A-44FF-8DEA-7811804EE175", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "D301B65D-A20B-4991-A0D8-DFE3363F162B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A08C715-A351-466D-99EC-006C106A3366", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8:*:*:*:*:*:*:*", "matchCriteriaId": "05185A74-8484-419D-A3CE-8603928AF0DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "52C533CA-ACB7-4C0F-98E2-B5E51E24A554", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_integrated_threat_management:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8D5F0-9606-4BBA-B7F9-ACD089B84DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "3DDF2EE3-753B-4C7E-84EF-144FA5986A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69184A5E-4FA9-4896-B6E8-1B9D4D62D099", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "F30C4FF9-DB76-4B3F-9582-752097B3D521", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "285013A5-E058-4B2B-B8B6-1BFF72388589", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0FF55705-42ED-4503-8534-FDEA365E84E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB548763-E1A7-4DB1-BE86-ED5AA1CA81BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r11:*:*:*:*:*:*:*", "matchCriteriaId": "6B28429A-F343-4BE8-A94D-5A5AC3F6258C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFF64064-1C35-4888-BBC2-52F68EF9517F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:secure_content_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DADD1E6-3454-4C1E-AD46-82D79CB8F528", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E02DA21-B25B-4626-BFDC-61AA8AF3537E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*", "matchCriteriaId": "5B4434A4-EE82-46A1-9293-345991515369", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "43CD3B48-C978-4FDB-B157-85F3E971446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus:2009:*:*:*:*:*:*:*", "matchCriteriaId": "6050CADE-7BAF-45B7-A031-F70558C7CE44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_for_the_enterprise:r8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0186ADA-0E20-4E14-B9D5-19CDFC1BD98F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_gateway:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD75FF0F-A36C-40AF-A99E-1596A6A6FE2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_plus:2009:*:*:*:*:*:*:*", "matchCriteriaId": "BED8CEF9-6AEC-4771-98F7-051E4B3E0848", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_for_windows_client_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "5603FDAD-A347-4A44-BC45-1ADC44601D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_for_windows_server_component:*:*:*:*:*:*:*:*", "matchCriteriaId": "5086D7CF-EBAB-4E30-98E0-0D276CC1C707", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:common_services:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7FAD043E-3ABE-46D7-AD17-A68858692A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_anti-virus_gateway:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C13B0E1-DCEE-46E5-81A3-C08C07C58B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_anti-virus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "257CC950-F1BB-4D0A-9B05-98A58DB67532", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_ez_antivirus:r7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0A641A2-4147-4C41-B102-18417ECA9339", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "29FEABEE-DC17-4620-B088-B24249865931", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D10B864B-AA39-4702-A42B-F33BAF2D8059", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DB54A16-5E56-46FC-A49C-56C98C0B8F1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:gateway_security:r8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B44F941C-83DC-4EDA-B258-C35F5EDA819E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_2008:*:*:*:*:*:*:*:*", "matchCriteriaId": "0281F80B-CF9C-482D-B7A9-3B2651BD0567", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_plus_2008:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F7E184-EA23-487C-83ED-65CF8DD2DB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_plus_2009:*:*:*:*:*:*:*:*", "matchCriteriaId": "951062B1-C72B-4EAF-BA54-6986434036FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*", "matchCriteriaId": "47C10BA4-B241-4F65-8FA1-AD88266C03B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*", "matchCriteriaId": "253A8082-9AE4-4049-A1D0-B7ACB5C2E8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r3.1:*:*:*:*:*:*:*", "matchCriteriaId": "CC845898-3D77-4793-971E-5E1555ED9CDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager:8.1:*:enterprise:*:*:*:*:*", "matchCriteriaId": "0115D81C-2CA2-424C-BE4B-0896C9ADA68E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager:r8:*:enterprise:*:*:*:*:*", "matchCriteriaId": "A38801CD-167E-408E-89BD-52BB1B89041B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager_total_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6AEE8BC-8D0E-464F-88B7-5C2C2D372AFA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8713893-59CE-486A-9262-E755A8F2D58C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente arclib en el motor Anti-Virus en CA Anti-Virus para Enterprise (formalmente eTrust Antivirus) v7.1 hasta v8.1; Anti-Virus 2007 (v8) hasta 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) hasta Plus 2009; y otros productos CA permite a atacantes remotos causar una denegaci\u00f3n de servicio y ejecutar probablemente c\u00f3digo de su elecci\u00f3n a trav\u00e9s del archivo RAR manipulado que provoca una corrupci\u00f3n de la memoria din\u00e1mica, una vulnerabilidad diferente que CVE-2009-3588." } ], "id": "CVE-2009-3587", "lastModified": "2024-11-21T01:07:44.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-10-13T10:30:00.610", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://osvdb.org/58691" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36976" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36653" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1022999" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/58691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1022999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 18:00
Modified
2024-11-21 01:24
Severity ?
Summary
The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ca | etrust_secure_content_manager | 8.0 | |
ca | gateway_security | 8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DB54A16-5E56-46FC-A49C-56C98C0B8F1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:gateway_security:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "DF520BDD-DF53-4EB8-9DFE-CCDE422473D0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow." }, { "lang": "es", "value": "El componente eCS (ECSQdmn.exe) en CA ETrust Secure Content Manager versi\u00f3n 8.0 y CA Gateway Security versi\u00f3n 8.1, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo) y ejecutar c\u00f3digo arbitrario por medio de una petici\u00f3n especialmente dise\u00f1ada hacia el puerto 1882, que implica un c\u00e1lculo de enteros incorrecto y un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria." } ], "id": "CVE-2011-0758", "lastModified": "2024-11-21T01:24:46.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-10T18:00:59.130", "references": [ { "source": "cve@mitre.org", "url": "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/70840" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43200" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/8075" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/516277/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/46253" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025052" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0306" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-059" }, { "source": "cve@mitre.org", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BEE6F16E1-6E05-4890-A739-2B9F745C721F%7D" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/70840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516277/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BEE6F16E1-6E05-4890-A739-2B9F745C721F%7D" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-10-13 10:30
Modified
2024-11-21 01:07
Severity ?
Summary
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:anti-virus:2007:8:*:*:*:*:*:*", "matchCriteriaId": "C469EBBE-EE96-4CED-BD8C-36461750C6A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus:2008:*:*:*:*:*:*:*", "matchCriteriaId": "9C5E892B-0EE8-4B76-97B8-0BAF17E83F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "607CCBDA-7288-4496-A7ED-EF6DED40CA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:r8:*:*:*:*:*:*:*", "matchCriteriaId": "11BCD267-E8CE-4A97-B769-5F4CAF9830D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "865B7BD2-3AD1-41CA-842B-47BC4F1426DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*", "matchCriteriaId": "0E2FA702-184A-44FF-8DEA-7811804EE175", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "D301B65D-A20B-4991-A0D8-DFE3363F162B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A08C715-A351-466D-99EC-006C106A3366", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8:*:*:*:*:*:*:*", "matchCriteriaId": "05185A74-8484-419D-A3CE-8603928AF0DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "52C533CA-ACB7-4C0F-98E2-B5E51E24A554", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_integrated_threat_management:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8D5F0-9606-4BBA-B7F9-ACD089B84DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "3DDF2EE3-753B-4C7E-84EF-144FA5986A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69184A5E-4FA9-4896-B6E8-1B9D4D62D099", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "F30C4FF9-DB76-4B3F-9582-752097B3D521", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "285013A5-E058-4B2B-B8B6-1BFF72388589", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0FF55705-42ED-4503-8534-FDEA365E84E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB548763-E1A7-4DB1-BE86-ED5AA1CA81BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r11:*:*:*:*:*:*:*", "matchCriteriaId": "6B28429A-F343-4BE8-A94D-5A5AC3F6258C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFF64064-1C35-4888-BBC2-52F68EF9517F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:secure_content_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DADD1E6-3454-4C1E-AD46-82D79CB8F528", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E02DA21-B25B-4626-BFDC-61AA8AF3537E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*", "matchCriteriaId": "5B4434A4-EE82-46A1-9293-345991515369", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "43CD3B48-C978-4FDB-B157-85F3E971446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus:2009:*:*:*:*:*:*:*", "matchCriteriaId": "6050CADE-7BAF-45B7-A031-F70558C7CE44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_for_the_enterprise:r8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0186ADA-0E20-4E14-B9D5-19CDFC1BD98F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_gateway:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD75FF0F-A36C-40AF-A99E-1596A6A6FE2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_plus:2009:*:*:*:*:*:*:*", "matchCriteriaId": "BED8CEF9-6AEC-4771-98F7-051E4B3E0848", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_for_windows_client_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "5603FDAD-A347-4A44-BC45-1ADC44601D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_for_windows_server_component:*:*:*:*:*:*:*:*", "matchCriteriaId": "5086D7CF-EBAB-4E30-98E0-0D276CC1C707", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:common_services:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7FAD043E-3ABE-46D7-AD17-A68858692A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_anti-virus_gateway:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C13B0E1-DCEE-46E5-81A3-C08C07C58B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_anti-virus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "257CC950-F1BB-4D0A-9B05-98A58DB67532", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_ez_antivirus:r7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0A641A2-4147-4C41-B102-18417ECA9339", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "29FEABEE-DC17-4620-B088-B24249865931", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D10B864B-AA39-4702-A42B-F33BAF2D8059", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DB54A16-5E56-46FC-A49C-56C98C0B8F1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:gateway_security:r8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B44F941C-83DC-4EDA-B258-C35F5EDA819E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_2008:*:*:*:*:*:*:*:*", "matchCriteriaId": "0281F80B-CF9C-482D-B7A9-3B2651BD0567", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_plus_2008:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F7E184-EA23-487C-83ED-65CF8DD2DB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_plus_2009:*:*:*:*:*:*:*:*", "matchCriteriaId": "951062B1-C72B-4EAF-BA54-6986434036FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*", "matchCriteriaId": "47C10BA4-B241-4F65-8FA1-AD88266C03B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*", "matchCriteriaId": "253A8082-9AE4-4049-A1D0-B7ACB5C2E8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r3.1:*:*:*:*:*:*:*", "matchCriteriaId": "CC845898-3D77-4793-971E-5E1555ED9CDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager:8.1:*:enterprise:*:*:*:*:*", "matchCriteriaId": "0115D81C-2CA2-424C-BE4B-0896C9ADA68E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager:r8:*:enterprise:*:*:*:*:*", "matchCriteriaId": "A38801CD-167E-408E-89BD-52BB1B89041B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager_total_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6AEE8BC-8D0E-464F-88B7-5C2C2D372AFA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:arcserve_backup:r12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "0486108C-E36C-4746-919E-C760E10EBAE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:arcserve_backup:r12.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "CD2F60F0-E8B8-46E6-932E-DF9F4457B47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8713893-59CE-486A-9262-E755A8F2D58C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587." }, { "lang": "es", "value": "Vulnerabilidad inespec\u00edfica en el componente arclib en el motor antivirus en CA Anti-Virus para empresas (anteriormente eTrust Antivirus) desde v7.1 hasta r8.1; Anti-Virus desde 2007 (v8) hasta 2009; eTrust EZ Antivirus r7.1; Internet Security Suite desde 2007 (v3) hasta Plus 2009; y otros productos de CA permite a atacantes remotos producir una denegaci\u00f3n de servicio a trav\u00e9s de un archivo RAR manipulado que inicia la corrupci\u00f3n de la pila, una vulnerabilidad diferente que CVE-2009-3587." } ], "id": "CVE-2009-3588", "lastModified": "2024-11-21T01:07:44.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-10-13T10:30:00.627", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36976" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36653" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1022999" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "source": "cve@mitre.org", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1022999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53698" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-07-28 22:55
Modified
2024-11-21 01:28
Severity ?
Summary
Icihttp.exe in CA Gateway Security for HTTP, as used in CA Gateway Security 8.1 before 8.1.0.69 and CA Total Defense r12, does not properly parse URLs, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and daemon crash) via a malformed request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
broadcom | total_defense | r12 | |
ca | gateway_security | 8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:total_defense:r12:*:*:*:*:*:*:*", "matchCriteriaId": "EAD87D20-B6C6-4D48-BEF7-5960AB2060D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:gateway_security:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "DF520BDD-DF53-4EB8-9DFE-CCDE422473D0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Icihttp.exe in CA Gateway Security for HTTP, as used in CA Gateway Security 8.1 before 8.1.0.69 and CA Total Defense r12, does not properly parse URLs, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and daemon crash) via a malformed request." }, { "lang": "es", "value": "Icihttp.exe en CA Gateway Security para HTTP, como se usa en CA Gateway Security v8.1 antes de v8.1.0.69 y CA Total Defense r12, no analiza correctamente las direcciones URL, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica y ca\u00edda del demonio) a trav\u00e9s de una solicitud mal formada." } ], "id": "CVE-2011-2667", "lastModified": "2024-11-21T01:28:43.423", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-07-28T22:55:02.390", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45332" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/8316" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1025812" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1025813" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518934/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518935/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48813" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-237/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68736" }, { "source": "cve@mitre.org", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7B5E404992-6B58-4C44-A29D-027D05B6285D%7D" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518934/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518935/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-237/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7B5E404992-6B58-4C44-A29D-027D05B6285D%7D" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }