ID

VAR-200707-0263


CVE

CVE-2007-3875


TITLE

CA Anti-Virus Such as arclib.dll Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-002374

DESCRIPTION

arclib.dll before 7.3.0.9 in CA Anti-Virus (formerly eTrust Antivirus) 8 and certain other CA products allows remote attackers to cause a denial of service (infinite loop and loss of antivirus functionality) via an invalid "previous listing chunk number" field in a CHM file. Multiple Computer Associates products are prone to a denial-of-service vulnerability because the applications fail to handle malformed CHM files. Successfully exploiting this issue will cause the affected applications to stop responding, denying service to legitimate users. This issue affects applications that use the 'arclib.dll' library versions prior to 7.3.0.9. The Arclib.DLL library in eTrust products has a security vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Title: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities CA Vuln ID (CAID): 35525, 35526 CA Advisory Date: 2007-07-24 Reported By: CVE-2006-5645 - Titon of BastardLabs and Damian Put <pucik at overflow dot pl> working with the iDefense VCP. CVE-2007-3875 - An anonymous researcher working with the iDefense VCP. Sergio Alvarez of n.runs AG also reported these issues. Impact: A remote attacker can cause a denial of service. Summary: CA products that utilize the Arclib library contain two denial of service vulnerabilities. The second vulnerability, CVE-2006-5645, is due to an application hang when processing a specially malformed RAR file. Mitigating Factors: None Severity: CA has given these vulnerabilities a Medium risk rating. Affected Products: CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.0, 7.1, r8, r8.1 CA Anti-Virus 2007 (v8) eTrust EZ Antivirus r7, r6.1 CA Internet Security Suite 2007 (v3) eTrust Internet Security Suite r1, r2 eTrust EZ Armor r1, r2, r3.x CA Threat Manager for the Enterprise (formerly eTrust Integrated Threat Management) r8 CA Anti-Virus Gateway (formerly eTrust Antivirus eTrust Antivirus Gateway) 7.1 CA Protection Suites r2, r3 CA Secure Content Manager (formerly eTrust Secure Content Manager) 1.1, 8.0 CA Anti-Spyware for the Enterprise (Formerly eTrust PestPatrol) r8, 8.1 CA Anti-Spyware 2007 Unicenter Network and Systems Management (NSM) r3.0, r3.1, r11, r11.1 BrightStor ARCserve Backup v9.01, r11 for Windows, r11.1, r11.5 BrightStor Enterprise Backup r10.5 BrightStor ARCserve Client agent for Windows eTrust Intrusion Detection 2.0 SP1, 3.0, 3.0 SP1 CA Common Services (CCS) r11, r11.1 CA Anti-Virus SDK (formerly eTrust Anti-Virus SDK) Status and Recommendation: CA has provided an update to address the vulnerabilities. The updated Arclib library is provided in automatic content updates with most products. Ensure that the latest content update is installed. In the case where automatic updates are not available, use the following product specific instructions. CA Secure Content Manager 1.1: Apply QO89469. CA Secure Content Manager 8.0: Apply QO87114. Unicenter Network and Systems Management (NSM) r3.0: Apply QO89141. Unicenter Network and Systems Management (NSM) r3.1: Apply QO89139. Unicenter Network and Systems Management (NSM) r11: Apply QO89140. Unicenter Network and Systems Management (NSM) r11.1: Apply QO89138. CA Common Services (CCS) r11: Apply QO89140. CA Common Services (CCS) r11.1: Apply QO89138. CA Anti-Virus Gateway 7.1: Apply QO89381. eTrust Intrusion Detection 2.0 SP1: Apply QO89474. eTrust Intrusion Detection 3.0: Apply QO86925. eTrust Intrusion Detection 3.0 SP1: Apply QO86923. CA Protection Suites r2: Apply updates for CA Anti-Virus 7.1. BrightStor ARCserve Backup and BrightStor ARCserve Client agent for Windows: Manually replace the arclib.dll file with the one provided in the CA Anti-Virus 7.1 fix set. 1. Locate and rename the existing arclib.dll file. 2. Download the CA Anti-Virus 7.1 patch that matches the host operating system. 3. Unpack the patch and place the arclib.dll file in directory where the existing arclib.dll file was found in step 1. 4. Reboot the host. CA Anti-Virus 7.1 (non Windows): T229327 – Solaris – QO86831 T229328 – Netware – QO86832 T229329 – MacPPC – QO86833 T229330 – MacIntel – QO86834 T229331 – Linux390 – QO86835 T229332 – Linux – QO86836 T229333 – HP-UX – QO86837 CA Anti-Virus 7.1 (Windows): T229337 – NT (32 bit) – QO86843 T229338 – NT (AMD64) – QO86846 CA Threat Manager for the Enterprise r8.1 (non Windows): T229334 – Linux – QO86839 T229335 – Mac – QO86828 T229336 – Solaris – QO86829 How to determine if you are affected: For products on Windows: 1. Using Windows Explorer, locate the file “arclib.dll”. By default, the file is located in the “C:\Program Files\CA\SharedComponents\ScanEngine” directory(*). 2. Right click on the file and select Properties. 3. Select the Version tab. 4. If the file version is earlier than indicated in the table below, the installation is vulnerable. File Name File Version arclib.dll 7.3.0.9 *For eTrust Intrusion Detection 2.0 the file is located in “Program Files\eTrust\Intrusion Detection\Common”, and for eTrust Intrusion Detection 3.0 and 3.0 sp1, the file is located in “Program Files\CA\Intrusion Detection\Common”. For CA Anti-Virus r8.1 on non-Windows: Use the compver utility provided on the CD to determine the version of arclib.dll. The same version information above applies. Workaround: None References (URLs may wrap): CA SupportConnect: http://supportconnect.ca.com/ Security Notice for CA Products Containing Arclib http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot .asp Solution Document Reference APARs: QO89469, QO87114, QO89141, QO89139, QO89140, QO89138, QO89140, QO89138, QO89381, QO89474, QO86925, QO86923, QO86831, QO86832, QO86833, QO86834, QO86835, QO86836, QO86837, QO86843, QO86846, QO86839, QO86828, QO86829 CA Security Advisor posting: CA Products Arclib Library Denial of Service Vulnerabilities http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847 CA Vuln ID (CAID): 35525, 35526 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35525 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35526 Reported By: CVE-2006-5645 - Titon of BastardLabs and Damian Put <pucik at overflow dot pl> working with the iDefense VCP. CVE-2007-3875 - An anonymous researcher working with the iDefense VCP. Sergio Alvarez of n.runs AG also reported these issues. iDefense advisories: Computer Associates AntiVirus CHM File Handling DoS Vulnerability http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439 CVE References: CVE-2006-5645, CVE-2007-3875 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5645 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3875 OSVDB References: Pending http://osvdb.org/ Changelog for this advisory: v1.0 - Initial Release Customers who require additional information should contact CA Technical Support at http://supportconnect.ca.com. For technical questions or comments related to this advisory, please send email to vuln AT ca DOT com. If you discover a vulnerability in CA products, please report your findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability" form. URL: http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx Regards, Ken Williams ; 0xE2941985 Director, CA Vulnerability Research CA, 1 CA Plaza, Islandia, NY 11749 Contact http://www.ca.com/us/contact/ Legal Notice http://www.ca.com/us/legal/ Privacy Policy http://www.ca.com/us/privacy/ Copyright (c) 2007 CA. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.5.3 (Build 5003) wj8DBQFGpp9beSWR3+KUGYURAplHAJ4paEd/cX+2AxdBWfnw2zhfjAGQwACfW+mo tCqbonQi4DvtQ9a45c65y70= =o8Ac -----END PGP SIGNATURE----- . BACKGROUND eTrust is an antivirus application developed by Computer Associates. More information can be found on the vendor's website at the following URL. http://www3.ca.com/solutions/product.aspx?ID=156 II. DESCRIPTION Remote exploitation of a denial of Service (DoS) vulnerability in Computer Associates Inc.'s eTrust Antivirus products could allow attackers to create a DoS condition on the affected computer. III. ANALYSIS This denial of service attack will prevent the scanner from scanning other files on disk while it is stuck on the exploit file. The hung process can be quit by the user and does not consume all system resources. IV. DETECTION iDefense has confirmed this vulnerability in eTrust AntiVirus version r8. Previous versions of eTrust Antivirus are suspected vulnerable. Other Computer Associates products, as well as derived products, may also be vulnerable. V. WORKAROUND iDefense is not aware of any workarounds for this issue. VI. VENDOR RESPONSE Computer Associates has addressed this vulnerability by releasing updates. More information is available within Computer Associates advisory at the following URL. http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-3875 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 01/16/2007 Initial vendor notification 01/17/2007 Initial vendor response 07/24/2007 Coordinated public disclosure IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2007 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. scanning a specially crafted RAR archive. Please see the vendor's advisory for details. 2) The vendor credits Titon of BastardLabs and Damian Put, reported via iDefense Labs. ORIGINAL ADVISORY: CA: http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.25

sources: NVD: CVE-2007-3875 // JVNDB: JVNDB-2007-002374 // BID: 25049 // VULHUB: VHN-27237 // PACKETSTORM: 58024 // PACKETSTORM: 58018 // PACKETSTORM: 58032

AFFECTED PRODUCTS

vendor:camodel:protection suitesscope:eqversion:r3

Trust: 1.6

vendor:camodel:anti-virus for the enterprisescope:eqversion:8

Trust: 1.4

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:11

Trust: 1.0

vendor:broadcommodel:internet security suitescope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:etrust internet security suitescope:eqversion:2

Trust: 1.0

vendor:broadcommodel:etrust internet security suitescope:eqversion:1

Trust: 1.0

vendor:broadcommodel:antivirus sdkscope:eqversion:*

Trust: 1.0

vendor:broadcommodel:anti-virus for the enterprisescope:lteversion:8

Trust: 1.0

vendor:broadcommodel:etrust ez antivirusscope:eqversion:7

Trust: 1.0

vendor:broadcommodel:secure content managerscope:eqversion:1.1

Trust: 1.0

vendor:camodel:etrust intrusion detectionscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:etrust intrusion detectionscope:eqversion:2.0

Trust: 1.0

vendor:broadcommodel:brigthstor arcserve client for windowsscope:eqversion:*

Trust: 1.0

vendor:broadcommodel:anti-virus for the enterprisescope:eqversion:7.1

Trust: 1.0

vendor:broadcommodel:brightstor arcserve backupscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:secure content managerscope:eqversion:8.0

Trust: 1.0

vendor:broadcommodel:threat managerscope:eqversion:8

Trust: 1.0

vendor:broadcommodel:antispyware for the enterprisescope:eqversion:8

Trust: 1.0

vendor:broadcommodel:common servicesscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:antispyware for the enterprisescope:eqversion:8.1

Trust: 1.0

vendor:broadcommodel:brightstor enterprise backupscope:eqversion:10.5

Trust: 1.0

vendor:broadcommodel:etrust ez armorscope:eqversion:3

Trust: 1.0

vendor:broadcommodel:anti-virus for the enterprisescope:eqversion:8

Trust: 1.0

vendor:broadcommodel:etrust antivirus gatewayscope:eqversion:7.1

Trust: 1.0

vendor:broadcommodel:anti-virus for the enterprisescope:eqversion:7.0

Trust: 1.0

vendor:broadcommodel:anti-virus for the enterprisescope:eqversion:8.1

Trust: 1.0

vendor:broadcommodel:common servicesscope:eqversion:11

Trust: 1.0

vendor:broadcommodel:brightstor arcserve backupscope:eqversion:9.01

Trust: 1.0

vendor:broadcommodel:etrust antivirusscope:eqversion:8

Trust: 1.0

vendor:broadcommodel:anti-spywarescope:eqversion:2007

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:11.1

Trust: 1.0

vendor:camodel:brightstor arcserve backupscope:eqversion:11

Trust: 1.0

vendor:broadcommodel:anti virus sdkscope:eqversion:*

Trust: 1.0

vendor:broadcommodel:etrust ez antivirusscope:eqversion:6.1

Trust: 1.0

vendor:broadcommodel:etrust intrusion detectionscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:brightstor arcserve backupscope:eqversion:11.5

Trust: 1.0

vendor:broadcommodel:etrust ez armorscope:eqversion:2

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:brightstor arcserve clientscope:eqversion:*

Trust: 1.0

vendor:camodel:protection suitesscope:eqversion:r2

Trust: 1.0

vendor:broadcommodel:etrust ez armorscope:eqversion:1

Trust: 1.0

vendor:camodel:anti-spywarescope:eqversion:8

Trust: 0.8

vendor:camodel:brightstor arcserve backupscope: - version: -

Trust: 0.8

vendor:camodel:brightstor arcserve clientscope: - version: -

Trust: 0.8

vendor:camodel:brightstor enterprise backupscope: - version: -

Trust: 0.8

vendor:camodel:brigthstor arcserve client for windowsscope: - version: -

Trust: 0.8

vendor:camodel:anti-spyware for the enterprisescope: - version: -

Trust: 0.8

vendor:camodel:anti-virusscope:eqversion:8

Trust: 0.8

vendor:camodel:anti-virus sdkscope:eqversion:8

Trust: 0.8

vendor:camodel:common servicesscope: - version: -

Trust: 0.8

vendor:camodel:etrust intrusion detectionscope:eqversion:8

Trust: 0.8

vendor:camodel:internet security suitescope: - version: -

Trust: 0.8

vendor:camodel:protection suitesscope: - version: -

Trust: 0.8

vendor:camodel:secure content managerscope: - version: -

Trust: 0.8

vendor:camodel:threat managerscope: - version: -

Trust: 0.8

vendor:camodel:etrust antivirus gatewayscope:eqversion:8

Trust: 0.8

vendor:camodel:etrust ez antivirusscope:eqversion:8

Trust: 0.8

vendor:camodel:etrust ez armorscope:eqversion:8

Trust: 0.8

vendor:camodel:etrust internet security suitescope:eqversion:8

Trust: 0.8

vendor:camodel:unicenter network and systems managementscope: - version: -

Trust: 0.8

vendor:camodel:threat managerscope:eqversion:8

Trust: 0.6

vendor:camodel:anti-spywarescope:eqversion:2007

Trust: 0.6

vendor:camodel:anti-virus for the enterprisescope:eqversion:7.0

Trust: 0.6

vendor:camodel:anti-virus for the enterprisescope:eqversion:7.1

Trust: 0.6

vendor:camodel:common servicesscope:eqversion:11

Trust: 0.6

vendor:camodel:secure content managerscope:eqversion:8.0

Trust: 0.6

vendor:camodel:internet security suitescope:eqversion:3.0

Trust: 0.6

vendor:camodel:anti-virus for the enterprisescope:eqversion:8.1

Trust: 0.6

vendor:computermodel:associates etrust antivirusscope:eqversion:6.1

Trust: 0.3

vendor:computermodel:associates protection suites r2scope:eqversion:0

Trust: 0.3

vendor:computermodel:associates etrust internet security suite r1scope: - version: -

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates anti-virus gatewayscope:eqversion:7.1

Trust: 0.3

vendor:computermodel:associates etrust intrusion detection spscope:eqversion:3.01

Trust: 0.3

vendor:computermodel:associates anti-spyware for the enterprise r8scope: - version: -

Trust: 0.3

vendor:computermodel:associates etrust ez armorscope:eqversion:2.0

Trust: 0.3

vendor:computermodel:associates etrust antivirusscope:eqversion:7.1

Trust: 0.3

vendor:computermodel:associates protection suites r3scope: - version: -

Trust: 0.3

vendor:computermodel:associates anti-spywarescope:eqversion:2007

Trust: 0.3

vendor:computermodel:associates etrust antivirusscope:eqversion:7.0

Trust: 0.3

vendor:computermodel:associates internet security suitescope:eqversion:20073.0

Trust: 0.3

vendor:computermodel:associates etrust ez armorscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates etrust intrusion detectionscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:10.5

Trust: 0.3

vendor:computermodel:associates common services r11.1scope: - version: -

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates anti-spyware for the enterprise r8.1scope: - version: -

Trust: 0.3

vendor:computermodel:associates common services r11scope: - version: -

Trust: 0.3

vendor:computermodel:associates etrust antivirus r8scope: - version: -

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates etrust intrusion detection sp1scope:eqversion:2.0.0

Trust: 0.3

vendor:computermodel:associates etrust ez armorscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates etrust ez armorscope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates etrust antivirus r8.1scope: - version: -

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates anti-virus for the enterprise r8scope: - version: -

Trust: 0.3

vendor:computermodel:associates anti-virus sdkscope:eqversion:0

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates arcserve client agent for windowsscope:eqversion:0

Trust: 0.3

vendor:computermodel:associates anti-virusscope:eqversion:20078

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust internet security suite r2scope: - version: -

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:11.1

Trust: 0.3

sources: BID: 25049 // JVNDB: JVNDB-2007-002374 // CNNVD: CNNVD-200707-453 // NVD: CVE-2007-3875

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-3875
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-3875
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200707-453
value: MEDIUM

Trust: 0.6

VULHUB: VHN-27237
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-3875
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27237
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27237 // JVNDB: JVNDB-2007-002374 // CNNVD: CNNVD-200707-453 // NVD: CVE-2007-3875

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-3875

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 58018 // CNNVD: CNNVD-200707-453

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200707-453

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002374

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-27237

PATCH

title:Top Pageurl:http://www.ca.com/

Trust: 0.8

title:CA eTrust Repair measures for multiple product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=146845

Trust: 0.6

sources: JVNDB: JVNDB-2007-002374 // CNNVD: CNNVD-200707-453

EXTERNAL IDS

db:NVDid:CVE-2007-3875

Trust: 3.0

db:BIDid:25049

Trust: 2.0

db:SECUNIAid:26155

Trust: 1.8

db:VUPENid:ADV-2007-2639

Trust: 1.7

db:SECTRACKid:1018450

Trust: 1.7

db:JVNDBid:JVNDB-2007-002374

Trust: 0.8

db:CNNVDid:CNNVD-200707-453

Trust: 0.7

db:PACKETSTORMid:58018

Trust: 0.2

db:PACKETSTORMid:58024

Trust: 0.2

db:VULHUBid:VHN-27237

Trust: 0.1

db:PACKETSTORMid:58032

Trust: 0.1

sources: VULHUB: VHN-27237 // BID: 25049 // JVNDB: JVNDB-2007-002374 // PACKETSTORM: 58024 // PACKETSTORM: 58018 // PACKETSTORM: 58032 // CNNVD: CNNVD-200707-453 // NVD: CVE-2007-3875

REFERENCES

url:http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp

Trust: 2.2

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567

Trust: 2.2

url:http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847

Trust: 1.8

url:http://www.securityfocus.com/bid/25049

Trust: 1.7

url:http://www.securityfocus.com/archive/1/474601/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/474605/100/100/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/474683/100/0/threaded

Trust: 1.7

url:http://www.securitytracker.com/id?1018450

Trust: 1.7

url:http://secunia.com/advisories/26155

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/2639

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35573

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3875

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3875

Trust: 0.8

url:/archive/1/474601

Trust: 0.3

url:/archive/1/474568

Trust: 0.3

url:/archive/1/474605

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-3875

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5645

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx

Trust: 0.1

url:http://supportconnect.ca.com.

Trust: 0.1

url:http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35526

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439

Trust: 0.1

url:http://osvdb.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5645

Trust: 0.1

url:http://supportconnect.ca.com/

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35525

Trust: 0.1

url:http://www.ca.com/us/contact/

Trust: 0.1

url:http://www.ca.com/us/legal/

Trust: 0.1

url:http://www.ca.com/us/privacy/

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://www3.ca.com/solutions/product.aspx?id=156

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:http://secunia.com/product/14862/

Trust: 0.1

url:http://secunia.com/product/4088/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86829

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86846

Trust: 0.1

url:http://secunia.com/product/314/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86837

Trust: 0.1

url:http://secunia.com/product/14867/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86831

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86835

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/14433/

Trust: 0.1

url:http://secunia.com/product/3099/

Trust: 0.1

url:http://secunia.com/product/3391/

Trust: 0.1

url:http://secunia.com/product/4092/

Trust: 0.1

url:http://secunia.com/product/14804/

Trust: 0.1

url:http://secunia.com/product/8147/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo89139

Trust: 0.1

url:http://secunia.com/product/14868/

Trust: 0.1

url:http://secunia.com/product/14434/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86828

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo89474&startsearch=1

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86843

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/14864/

Trust: 0.1

url:http://secunia.com/product/14869/

Trust: 0.1

url:http://secunia.com/product/14437/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86832

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo89469

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86839

Trust: 0.1

url:http://secunia.com/product/14436/

Trust: 0.1

url:http://secunia.com/product/8144/

Trust: 0.1

url:http://secunia.com/advisories/26155/

Trust: 0.1

url:http://secunia.com/product/14866/

Trust: 0.1

url:http://secunia.com/product/14865/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo89381&startsearch=1

Trust: 0.1

url:http://secunia.com/product/1683/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86833

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo89138&startsearch=1

Trust: 0.1

url:http://secunia.com/product/2198/

Trust: 0.1

url:http://secunia.com/product/8250/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/14863/

Trust: 0.1

url:http://secunia.com/product/3390/

Trust: 0.1

url:http://secunia.com/product/8119/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo89140

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86925&startsearch=1

Trust: 0.1

url:http://secunia.com/product/313/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86836

Trust: 0.1

url:http://secunia.com/product/14435/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo87114

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86923&startsearch=1

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo86834

Trust: 0.1

url:http://secunia.com/product/312/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo89141

Trust: 0.1

url:http://secunia.com/product/10672/

Trust: 0.1

url:http://secunia.com/product/7112/

Trust: 0.1

url:http://secunia.com/product/10673/

Trust: 0.1

sources: VULHUB: VHN-27237 // BID: 25049 // JVNDB: JVNDB-2007-002374 // PACKETSTORM: 58024 // PACKETSTORM: 58018 // PACKETSTORM: 58032 // CNNVD: CNNVD-200707-453 // NVD: CVE-2007-3875

CREDITS

iDEFENSE

Trust: 0.6

sources: CNNVD: CNNVD-200707-453

SOURCES

db:VULHUBid:VHN-27237
db:BIDid:25049
db:JVNDBid:JVNDB-2007-002374
db:PACKETSTORMid:58024
db:PACKETSTORMid:58018
db:PACKETSTORMid:58032
db:CNNVDid:CNNVD-200707-453
db:NVDid:CVE-2007-3875

LAST UPDATE DATE

2024-11-23T21:57:26.565000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27237date:2018-10-15T00:00:00
db:BIDid:25049date:2007-07-27T18:05:00
db:JVNDBid:JVNDB-2007-002374date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200707-453date:2021-04-08T00:00:00
db:NVDid:CVE-2007-3875date:2024-11-21T00:34:17.190

SOURCES RELEASE DATE

db:VULHUBid:VHN-27237date:2007-07-26T00:00:00
db:BIDid:25049date:2007-07-24T00:00:00
db:JVNDBid:JVNDB-2007-002374date:2012-06-26T00:00:00
db:PACKETSTORMid:58024date:2007-07-25T04:50:57
db:PACKETSTORMid:58018date:2007-07-25T04:42:29
db:PACKETSTORMid:58032date:2007-07-26T04:26:32
db:CNNVDid:CNNVD-200707-453date:2007-07-25T00:00:00
db:NVDid:CVE-2007-3875date:2007-07-26T00:30:00