CVE-2009-0042
https://notcve.org/view.php?id=CVE-2009-0042
Multiple unspecified vulnerabilities in the Arclib library (arclib.dll) before 7.3.0.15 in the CA Anti-Virus engine for CA Anti-Virus for the Enterprise 7.1, r8, and r8.1; Anti-Virus 2007 v8 and 2008; Internet Security Suite 2007 v3 and 2008; and other CA products allow remote attackers to bypass virus detection via a malformed archive file. Múltiples vulnerabilidades sin especificar en la bilioteca Arclib (arclib.dll) anterior a v 7.3.0.15 en el motor de CA Anti-Virus para CA Anti-Virus Enterprise v7.1, r8, y r8.1; Anti-Virus 2007 v8 y 2008; Internet Security Suite 2007 v3 y 2008; y otros productos CA, permite a atacantes remotos evitar la detección de virus a través de un fichero mal formado. • http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/26/ca20090126-01-ca-anti-virus-engine-detection-evasion-multiple-vulnerabilities.aspx http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197601 http://www.securityfocus.com/archive/1/500417/100/0/threaded http://www.securityfocus.com/bid/33464 http://www.securitytracker.com/id?1021639 http://www.vupen.com/english/advisories/2009/0270 https://exchange.xforce.ibmcloud.com/vulnerabilities/48261 •
CVE-2007-3302
https://notcve.org/view.php?id=CVE-2007-3302
The CallCode ActiveX control in caller.dll 3.0 before 20070713, and 3.0 SP1 before 3.0.5.81, in CA (formerly Computer Associates) eTrust Intrusion Detection allows remote attackers to load arbitrary DLLs on a client system, and execute code from these DLLs, via unspecified "scriptable functions." El control de ActiveX CallCode en el caller.dll 3.0 anterior al 20070713 y el 3.0 SP1 anterior al 3.0.5.81, en el CA (antiguamente conocido como Computer Associates) eTrust Intrusion Detection permite a atacantes remotos la carga de DLLs de su elección en un sistema cliente, y ejecutar código desde esas DLLs mediante "funciones incluida en secuencias de comandos" sin especificar. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=568 http://secunia.com/advisories/26134 http://supportconnectw.ca.com/public/etrust/etrust_intrusion/infodocs/eid-callervilnsecnot.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149811 http://www.securityfocus.com/archive/1/474599/100/0/threaded http://www.securityfocus.com/bid/25050 http://www.securitytracker.com/id?1018447 http://www.vupen.com/english/advisories/2007/2640 https://exchange.xforce.ibmclo •