CVE-2007-2523 – CA (Multiple Products) - Console Server / 'InoCore.dll' Remote Code Execution
https://notcve.org/view.php?id=CVE-2007-2523
CA Anti-Virus for the Enterprise r8 and Threat Manager r8 before 20070510 use weak permissions (NULL security descriptor) for the Task Service shared file mapping, which allows local users to modify this mapping and gain privileges by triggering a stack-based buffer overflow in InoCore.dll before 8.0.448.0. El Anti-Virus CA para la Enterprise r8 y el Threat Manager r8 antes del 20070510 usa permisos débiles (seguridad de descriptor NULL) para el fichero de mapeo compartido del Task Service, lo cual permite a usuarios locales modificar este mapeo y obtener privilegios mediante el disparo de un desbordamiento de búfer basado en pila en el InoCore.dll en versiones anteriores a 8.0.448.0. • https://www.exploit-db.com/exploits/30019 http://blog.48bits.com/?p=103 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=530 http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063275.html http://secunia.com/advisories/25202 http://supportconnectw.ca.com/public/antivirus/infodocs/caav-secnotice050807.asp http://www.kb.cert.org/vuls/id/788416 http://www.osvdb.org/34586 http://www.securityfocus.com/archive/1/468306/100/0/threaded http://www. •
CVE-2007-2522 – CA eTrust AntiVirus Server inoweb Buffer Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-2522
Stack-based buffer overflow in the inoweb Console Server in CA Anti-Virus for the Enterprise r8, Threat Manager r8, Anti-Spyware for the Enterprise r8, and Protection Suites r3 allows remote attackers to execute arbitrary code via a long (1) username or (2) password. Un desbordamiento de búfer en la región Stack de la memoria en el Servidor de la Consola inoweb en CA Anti-Virus para Enterprise r8, Threat Manager r8, Anti-Spyware para Enterprise r8 y Protection Suites r3 permite a los atacantes remotos ejecutar código arbitrario por medio de un (1) nombre de usuario o (2) contraseña largos. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates AntiVirus Server. User interaction is not required to exploit this vulnerability. The specific flaw exists in the authentication function of the inoweb service that listens by default on TCP port 12168. The function copies both the username and password into fixed-length stack buffers. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063275.html http://secunia.com/advisories/25202 http://supportconnectw.ca.com/public/antivirus/infodocs/caav-secnotice050807.asp http://www.kb.cert.org/vuls/id/680616 http://www.osvdb.org/34585 http://www.securityfocus.com/archive/1/468304/100/0/threaded http://www.securityfocus.com/bid/23906 http://www.securitytracker.com/id?1018043 http://www.vupen.com/english/advisories/2007/1750 http://www.zerodayinitiative.com • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-3223
https://notcve.org/view.php?id=CVE-2006-3223
Format string vulnerability in CA Integrated Threat Management (ITM), eTrust Antivirus (eAV), and eTrust PestPatrol (ePP) r8 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a scan job with format strings in the description field. Vulnerabilidad de cadena de formato en CA Integrated Threat Management (ITM), eTrust Antivirus (eAV) y eTrust PestPatrol (ePP) r8 permite a atacantes provocar una denegación de servicio (caída de la aplicación) y posiblemente ejecutar código de su elección a través de un tarea de escaneado con un cadena de formato en el campo "description" (descripción). • http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047423.html http://secunia.com/advisories/20856 http://securitytracker.com/id?1016391 http://www.osvdb.org/26654 http://www.securityfocus.com/archive/1/438503/100/0/threaded http://www.securityfocus.com/archive/1/438582/100/0/threaded http://www.securityfocus.com/bid/18689 http://www.vupen.com/english/advisories/2006/2565 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34325 https://exchange.xforce.ibm •
CVE-2005-3653
https://notcve.org/view.php?id=CVE-2005-3653
Heap-based buffer overflow in the iGateway service for various Computer Associates (CA) iTechnology products, in iTechnology iGateway before 4.0.051230, allows remote attackers to execute arbitrary code via an HTTP request with a negative Content-Length field. • http://marc.info/?l=full-disclosure&m=113803349715927&w=2 http://secunia.com/advisories/18591 http://securityreason.com/securityalert/380 http://securitytracker.com/id?1015526 http://supportconnectw.ca.com/public/ca_common_docs/igatewaysecurity_notice.asp http://www.idefense.com/intelligence/vulnerabilities/display.php?id=376 http://www.osvdb.org/22688 http://www.securityfocus.com/archive/1/423288/100/0/threaded http://www.securityfocus.com/archive/1/423403/100/0/threaded http:// • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •