CVE-2007-2522
CA eTrust AntiVirus Server inoweb Buffer Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in the inoweb Console Server in CA Anti-Virus for the Enterprise r8, Threat Manager r8, Anti-Spyware for the Enterprise r8, and Protection Suites r3 allows remote attackers to execute arbitrary code via a long (1) username or (2) password.
Un desbordamiento de búfer en la región Stack de la memoria en el Servidor de la Consola inoweb en CA Anti-Virus para Enterprise r8, Threat Manager r8, Anti-Spyware para Enterprise r8 y Protection Suites r3 permite a los atacantes remotos ejecutar código arbitrario por medio de un (1) nombre de usuario o (2) contraseña largos.
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates AntiVirus Server. User interaction is not required to exploit this vulnerability.
The specific flaw exists in the authentication function of the inoweb service that listens by default on TCP port 12168. The function copies both the username and password into fixed-length stack buffers. If an attacker provides overly long values for these parameters, an exploitable buffer overflow occurs.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-05-08 CVE Reserved
- 2007-05-10 CVE Published
- 2024-02-04 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063275.html | Mailing List | |
http://supportconnectw.ca.com/public/antivirus/infodocs/caav-secnotice050807.asp | X_refsource_confirm | |
http://www.kb.cert.org/vuls/id/680616 | Third Party Advisory | |
http://www.osvdb.org/34585 | Vdb Entry | |
http://www.securityfocus.com/archive/1/468304/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/23906 | Vdb Entry | |
http://www.securitytracker.com/id?1018043 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-07-028.html | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34204 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/25202 | 2021-04-09 | |
http://www.vupen.com/english/advisories/2007/1750 | 2021-04-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Broadcom Search vendor "Broadcom" | Antispyware For The Enterprise Search vendor "Broadcom" for product "Antispyware For The Enterprise" | 8.0 Search vendor "Broadcom" for product "Antispyware For The Enterprise" and version "8.0" | - |
Affected
| ||||||
Broadcom Search vendor "Broadcom" | Etrust Integrated Threat Management Search vendor "Broadcom" for product "Etrust Integrated Threat Management" | 8.0 Search vendor "Broadcom" for product "Etrust Integrated Threat Management" and version "8.0" | - |
Affected
| ||||||
Broadcom Search vendor "Broadcom" | Etrust Pestpatrol Search vendor "Broadcom" for product "Etrust Pestpatrol" | 8.0 Search vendor "Broadcom" for product "Etrust Pestpatrol" and version "8.0" | - |
Affected
|