// For flags

CVE-2007-2522

CA eTrust AntiVirus Server inoweb Buffer Overflow Vulnerability

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Stack-based buffer overflow in the inoweb Console Server in CA Anti-Virus for the Enterprise r8, Threat Manager r8, Anti-Spyware for the Enterprise r8, and Protection Suites r3 allows remote attackers to execute arbitrary code via a long (1) username or (2) password.

Un desbordamiento de búfer en la región Stack de la memoria en el Servidor de la Consola inoweb en CA Anti-Virus para Enterprise r8, Threat Manager r8, Anti-Spyware para Enterprise r8 y Protection Suites r3 permite a los atacantes remotos ejecutar código arbitrario por medio de un (1) nombre de usuario o (2) contraseña largos.

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates AntiVirus Server. User interaction is not required to exploit this vulnerability.
The specific flaw exists in the authentication function of the inoweb service that listens by default on TCP port 12168. The function copies both the username and password into fixed-length stack buffers. If an attacker provides overly long values for these parameters, an exploitable buffer overflow occurs.

*Credits: Tenable Network Security
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-05-08 CVE Reserved
  • 2007-05-10 CVE Published
  • 2024-02-04 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Broadcom
Search vendor "Broadcom"
Antispyware For The Enterprise
Search vendor "Broadcom" for product "Antispyware For The Enterprise"
8.0
Search vendor "Broadcom" for product "Antispyware For The Enterprise" and version "8.0"
-
Affected
Broadcom
Search vendor "Broadcom"
Etrust Integrated Threat Management
Search vendor "Broadcom" for product "Etrust Integrated Threat Management"
8.0
Search vendor "Broadcom" for product "Etrust Integrated Threat Management" and version "8.0"
-
Affected
Broadcom
Search vendor "Broadcom"
Etrust Pestpatrol
Search vendor "Broadcom" for product "Etrust Pestpatrol"
8.0
Search vendor "Broadcom" for product "Etrust Pestpatrol" and version "8.0"
-
Affected