CVE-2007-2522 – CA eTrust AntiVirus Server inoweb Buffer Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-2522
Stack-based buffer overflow in the inoweb Console Server in CA Anti-Virus for the Enterprise r8, Threat Manager r8, Anti-Spyware for the Enterprise r8, and Protection Suites r3 allows remote attackers to execute arbitrary code via a long (1) username or (2) password. Un desbordamiento de búfer en la región Stack de la memoria en el Servidor de la Consola inoweb en CA Anti-Virus para Enterprise r8, Threat Manager r8, Anti-Spyware para Enterprise r8 y Protection Suites r3 permite a los atacantes remotos ejecutar código arbitrario por medio de un (1) nombre de usuario o (2) contraseña largos. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates AntiVirus Server. User interaction is not required to exploit this vulnerability. The specific flaw exists in the authentication function of the inoweb service that listens by default on TCP port 12168. The function copies both the username and password into fixed-length stack buffers. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063275.html http://secunia.com/advisories/25202 http://supportconnectw.ca.com/public/antivirus/infodocs/caav-secnotice050807.asp http://www.kb.cert.org/vuls/id/680616 http://www.osvdb.org/34585 http://www.securityfocus.com/archive/1/468304/100/0/threaded http://www.securityfocus.com/bid/23906 http://www.securitytracker.com/id?1018043 http://www.vupen.com/english/advisories/2007/1750 http://www.zerodayinitiative.com • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-3223
https://notcve.org/view.php?id=CVE-2006-3223
Format string vulnerability in CA Integrated Threat Management (ITM), eTrust Antivirus (eAV), and eTrust PestPatrol (ePP) r8 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a scan job with format strings in the description field. Vulnerabilidad de cadena de formato en CA Integrated Threat Management (ITM), eTrust Antivirus (eAV) y eTrust PestPatrol (ePP) r8 permite a atacantes provocar una denegación de servicio (caída de la aplicación) y posiblemente ejecutar código de su elección a través de un tarea de escaneado con un cadena de formato en el campo "description" (descripción). • http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047423.html http://secunia.com/advisories/20856 http://securitytracker.com/id?1016391 http://www.osvdb.org/26654 http://www.securityfocus.com/archive/1/438503/100/0/threaded http://www.securityfocus.com/archive/1/438582/100/0/threaded http://www.securityfocus.com/bid/18689 http://www.vupen.com/english/advisories/2006/2565 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34325 https://exchange.xforce.ibm •