Page 2 of 22 results (0.008 seconds)

CVSS: 6.6EPSS: 0%CPEs: 3EXPL: 0

The (1) VetMONNT.sys and (2) VetFDDNT.sys drivers in CA Anti-Virus 2007 8.1, Anti-Virus for Vista Beta 8.2, and CA Internet Security Suite 2007 v3.0 do not properly handle NULL buffers, which allows local users with administrative access to cause a denial of service (system crash) via certain IOCTLs. Los controladores de dispositivo (1) VetMONNT.sys y (2) VetFDDNT.sys de CA Anti-Virus 2007 8.1, Anti-Virus para Vista Beta 8.2 y CA Internet Security Suite 2007 v3.0 no gestionan apropiadamente búferes Null, lo cual permite a usuarios locales con acceso de administrados provocar una denegación de servicio (caída del sistema) mediante IOCTLs concretos. • http://crm.my-etrust.com/CIDocument.asp?KDId=2651&GUID=9FD7E4F8362C4A168D88B4FFA34DCB4C http://secunia.com/advisories/23378 http://securitytracker.com/id?1017381 http://securitytracker.com/id?1017382 http://www.osvdb.org/30845 http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=41 http://www.securityfocus.com/archive/1/454420/100/0/threaded http://www.securityfocus.com/bid/21593 http://www.vupen.com/english/advisories/2006/5010 http://www3.ca.com/ •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 0

Unspecified vulnerability in CA eTrust Antivirus WebScan allows remote attackers to execute arbitrary code due to "improper bounds checking when processing certain user input." Vulnerabilidad no especificada en CA eTrust Antivirus WebScan permite a atacantes remotos ejecutar código de su elección a través debido a "compruebam límites incorrectos al procesar cierta entrada de usuario". • http://secunia.com/advisories/21320 http://securitytracker.com/id?1016637 http://www.securityfocus.com/archive/1/442244/100/0/threaded http://www.vupen.com/english/advisories/2006/3166 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34509 •

CVSS: 9.3EPSS: 2%CPEs: 1EXPL: 0

Unspecified vulnerability in CA eTrust Antivirus WebScan before 1.1.0.1048 allows remote attackers to install arbitrary files. Vulnerabilidad no especificada en CA eTrust Antivirus WebScan anterior a 1.1.0.1048 permite a atacantes remotos intalar archivos de su elección. • http://secunia.com/advisories/21320 http://securitytracker.com/id?1016637 http://www.securityfocus.com/archive/1/442244/100/0/threaded http://www.vupen.com/english/advisories/2006/3166 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34509 •

CVSS: 9.3EPSS: 2%CPEs: 2EXPL: 0

Unspecified vulnerability in CA eTrust Antivirus WebScan before 1.1.0.1048 has unknown impact and remote attackers related to "improper processing of outdated WebScan components." Vulnerabildiad no especificada en CA eTrust Antivirus WebScan anterio a 1.1.0.1048 tiene un impacto desconocido y ataques remotos relacionados con "procedimientos impropios de componentes fuera WebScan fuera de fecha". • http://secunia.com/advisories/21320 http://securitytracker.com/id?1016637 http://www.securityfocus.com/archive/1/442244/100/0/threaded http://www.vupen.com/english/advisories/2006/3166 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34509 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Format string vulnerability in CA Integrated Threat Management (ITM), eTrust Antivirus (eAV), and eTrust PestPatrol (ePP) r8 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a scan job with format strings in the description field. Vulnerabilidad de cadena de formato en CA Integrated Threat Management (ITM), eTrust Antivirus (eAV) y eTrust PestPatrol (ePP) r8 permite a atacantes provocar una denegación de servicio (caída de la aplicación) y posiblemente ejecutar código de su elección a través de un tarea de escaneado con un cadena de formato en el campo "description" (descripción). • http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047423.html http://secunia.com/advisories/20856 http://securitytracker.com/id?1016391 http://www.osvdb.org/26654 http://www.securityfocus.com/archive/1/438503/100/0/threaded http://www.securityfocus.com/archive/1/438582/100/0/threaded http://www.securityfocus.com/bid/18689 http://www.vupen.com/english/advisories/2006/2565 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34325 https://exchange.xforce.ibm •