ID

VAR-200910-0352


CVE

CVE-2009-3587


TITLE

plural CA Product Anti-Virus In the engine arclib Vulnerability in arbitrary code execution in components

Trust: 0.8

sources: JVNDB: JVNDB-2009-002628

DESCRIPTION

Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588. This vulnerability CVE-2009-3588 Is a different vulnerability.Skillfully crafted by a third party RAR Service disruption via archive files (DoS) Could be put into a state or execute arbitrary code. Multiple Computer Associates products are prone to memory-corruption vulnerabilities that affect the Anti-Virus engine. An attacker can exploit these issues to execute arbitrary code in the context of the affected applications or cause denial-of-service conditions. The issues affect the Anti-Virus engine with versions prior to 'arclib' 8.1.4.0. Computer Associates is the world's leading security vendor, products include a variety of anti-virus software and backup recovery systems. CA20091008-01: Security Notice for CA Anti-Virus Engine Issued: October 8, 2009 CA's support is alerting customers to multiple security risks associated with CA Anti-Virus Engine. Vulnerabilities exist in the arclib component that can allow a remote attacker to cause a denial of service, or to cause heap corruption and potentially further compromise a system. CA has issued fixes to address the vulnerabilities. An attacker can create a malformed RAR archive file that results in heap corruption and allows the attacker to cause a denial of service or possibly further compromise the system. An attacker can create a malformed RAR archive file that results in stack corruption and allows the attacker to cause a denial of service. Risk Rating Medium Platform Windows UNIX Linux Solaris Mac OS X Netware Affected Products CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8 CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8.1 CA Anti-Virus 2007 (v8) CA Anti-Virus 2008 CA Anti-Virus 2009 CA Anti-Virus Plus 2009 eTrust EZ Antivirus r7.1 CA Internet Security Suite 2007 (v3) CA Internet Security Suite 2008 CA Internet Security Suite Plus 2008 CA Internet Security Suite Plus 2009 CA Threat Manager for the Enterprise (formerly eTrust Integrated Threat Management) r8 CA Threat Manager for the Enterprise (formerly eTrust Integrated Threat Management) 8.1 CA Threat Manager Total Defense CA Gateway Security r8.1 CA Protection Suites r2 CA Protection Suites r3 CA Protection Suites r3.1 CA Secure Content Manager (formerly eTrust Secure Content Manager) 1.1 CA Secure Content Manager (formerly eTrust Secure Content Manager) 8.0 CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r3.0 CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r3.1 CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r11 CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r11.1 CA ARCserve Backup r11.5 on Windows CA ARCserve Backup r12 on Windows CA ARCserve Backup r12.0 SP1 on Windows CA ARCserve Backup r12.0 SP 2 on Windows CA ARCserve Backup r12.5 on Windows CA ARCserve Backup r11.1 Linux CA ARCserve Backup r11.5 Linux CA ARCserve for Windows Client Agent CA ARCserve for Windows Server component CA eTrust Intrusion Detection 2.0 SP1 CA eTrust Intrusion Detection 3.0 CA eTrust Intrusion Detection 3.0 SP1 CA Common Services (CCS) r3.1 CA Common Services (CCS) r11 CA Common Services (CCS) r11.1 CA Anti-Virus SDK (formerly eTrust Anti-Virus SDK) CA Anti-Virus Gateway (formerly eTrust Antivirus Gateway) 7.1 Non-Affected Products CA Anti-Virus engine with arclib version 8.1.4.0 or later installed How to determine if the installation is affected For products on Windows: 1. Using Windows Explorer, locate the file "arclib.dll". By default, the file is located in the "C:\Program Files\CA\SharedComponents\ScanEngine" directory (*). 2. Right click on the file and select Properties. 3. Select the Version tab. 4. If the file version is earlier than indicated below, the installation is vulnerable. File Name File Version arclib.dll 8.1.4.0 *For eTrust Intrusion Detection 2.0, the file is located in "Program Files\eTrust\Intrusion Detection\Common", and for eTrust Intrusion Detection 3.0 and 3.0 sp1, the file is located in "Program Files\CA\Intrusion Detection\Common". For CA Anti-Virus r8.1 on non-Windows platforms: Use the compver utility provided on the CD to determine the version of Arclib. If the version is less than 8.1.4.0, the installation is vulnerable. Example compver utility output: ------------------------------------------------ COMPONENT NAME VERSION ------------------------------------------------ eTrust Antivirus Arclib Archive Library 8.1.4.0 ... (followed by other components) For reference, the following are file names for arclib on non-Windows operating systems: Operating System File name Solaris libarclib.so Linux libarclib.so Mac OS X arclib.bundle Solution CA released arclib 8.1.4.0 on August 12 2009. If your product is configured for automatic updates, you should already be protected, and you need to take no action. If your product is not configured for automatic updates, then you simply need to run the update utility included with your product. CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r3.0: apply fix # RO11964. CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r3.1: apply fix # RO11964. CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r11: apply fix # RO11964. CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r11.1: apply fix # RO11964. CA Common Services (CCS) r3.1: apply fix # RO11954. CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 32bit: apply fix # RO10663. CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 IA64: apply fix # RO10664. CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 AMD64: apply fix # RO10665. CA Secure Content Manager (formerly eTrust Secure Content Manager) r1.1: apply fix # RO10999. CA Secure Content Manager (formerly eTrust Secure Content Manager) r8.0: apply fix # RO10999. CA Anti-Virus Gateway (formerly eTrust Antivirus Gateway) 7.1: apply fix # RO11000. CA Gateway Security r8.1: RO10999. CA ARCserve for Windows Server component installed on a 64 bit machine: apply fixes # RO10663 and RO10664 (IA64) or RO10665 (AMD64). CA ARCserve for Windows Server component installed on a 32 bit machine: apply fix # RO10663. CA ARCserve for Windows Client Agent installed on a 64 bit machine: apply fix # RO10664 (IA64) or RO10665 (AMD64). CA ARCserve for Windows Client Agent installed on a 32 bit machine: apply fix # RO10663. CA ARCserve for Linux Server r11.5: apply fix # RO10729. CA ARCserve for Linux: 1. Download RO10729.tar.Z from RO10729 into a temporary location /tmp/RO10729 2. Uncompress and untar RO10729.tar.Z as follows: uncompress RO10729.tar.Z tar -xvf RO10729.tar The new "libarclib.so" will be extracted to /tmp/RO10729 3. Change the directory to $CAIGLBL0000/ino/config as follows: cd $CAIGLBL0000/ino/config 4. Rename "libarclib.so" to "libarclib.so.RO10729" as follows: mv libarclib.so libarclib.so.RO10729 5. Copy the new libarclib.so as follows: cp /tmp/RO10729/libarclib.so $CAIGLBL0000/ino/config/ 6. chmod +x $CAIGLBL0000/ino/config/libarclib.so 7. Stop the common agent (caagent stop) 8. Change the directory to ARCserve common agent directory (typically /opt/CA/BABcmagt) cd /opt/CA/BABcmagt Note: To find out the agent home directory run the following command: dirname 'ls -l /usr/bin/caagent |cut -f2 -d">"' 9. Save a copy of libarclib.so cp -p libarclib.so libarclib.so.RO10729 10. Copy over the new libarclib.so as follows: cp $/tmp/RO10729/libarclib.so. 11. Start the common agent (caagent start) 12. Repeat steps (7-11) on all remote Linux client agents' installations. 13. rm -rf /tmp/RO10729 Workaround Do not open email attachments or download files from untrusted sources. If additional information is required, please contact CA Support at http://support.ca.com/. If you discover a vulnerability in CA products, please report your findings to the CA Product Vulnerability Response Team. support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782 Regards, Ken Williams, Director ; 0xE2941985 CA Product Vulnerability Response Team CA, 1 CA Plaza, Islandia, NY 11749 Contact http://www.ca.com/us/contact/ Legal Notice http://www.ca.com/us/legal/ Privacy Policy http://www.ca.com/us/privacy/ Copyright (c) 2009 CA. All rights reserved. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: CA Anti-Virus Engine RAR Processing Two Vulnerabilities SECUNIA ADVISORY ID: SA36976 VERIFY ADVISORY: http://secunia.com/advisories/36976/ DESCRIPTION: Two vulnerabilities have been reported in multiple CA products, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. Successful exploitation may allow execution of arbitrary code. Please see the vendor's advisory for detailed instructions on applying patches. PROVIDED AND/OR DISCOVERED BY: The vendor credits Thierry Zoller. ORIGINAL ADVISORY: CA20091008-01: https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Background ~~~~~~~~~~~~~ Quote: "CA is one of the world's largest IT management software providers. We serve more than 99% of Fortune 1000 companies, as well as government entities, educational institutions and thousands of other companies in diverse industries worldwide" "CA Anti-Virus for the Enterprise is the next generation in comprehensive anti-virus security for business PCs, servers and PDAs. It combines proactive protection against malware with new, powerful management features that stop and remove malicious code before it enters your network, reducing system downtime" II. Attacker has control over EBX : Basic Block: 6e4305b0 mov cl,byte ptr [ebx] Tainted Input Operands: ebx 6e4305b2 add edi,28h 6e4305b5 push edi 6e4305b6 lea edx,[esp+14h] 6e4305ba mov byte ptr [esp+14h],cl Tainted Input Operands: cl 6e4305be inc ebx Tainted Input Operands: ebx 6e4305bf push edx 6e4305c0 mov ecx,esi 6e4305c2 mov dword ptr [esp+1ch],ebx Tainted Input Operands: ebx 6e4305c6 call arclib!arctkopenarchive+0x283a0 (6e42f9f0) III. Due to the nature of Anti-virus products, the attack vectors can be near endless. An attack could be done over the way of an E-mail message carrying an RAR attachment (of a file recognised as being RAR), USB, CD, Network data etc. Please note that this is a general problem and not exclusive to Computer Associates. IV. Disclosure timeline ~~~~~~~~~~~~~~~~~~~~~~~~~ DD.MM.YYYY 11.05.2009 - Reported CVE-2009-3587 03.06.2009 - Reported CVE-2009-3588 09.10.2009 - CA releases advisory https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878 13.10.2009 - G-SEC releases advisory

Trust: 2.25

sources: NVD: CVE-2009-3587 // JVNDB: JVNDB-2009-002628 // BID: 36653 // VULHUB: VHN-41033 // PACKETSTORM: 81918 // PACKETSTORM: 81885 // PACKETSTORM: 81986

AFFECTED PRODUCTS

vendor:camodel:anti-virus plusscope:eqversion:2009

Trust: 1.8

vendor:camodel:protection suitesscope:eqversion:r3.1

Trust: 1.6

vendor:camodel:threat managerscope:eqversion:r8

Trust: 1.6

vendor:camodel:threat managerscope:eqversion:8.1

Trust: 1.6

vendor:camodel:protection suitesscope:eqversion:r2

Trust: 1.6

vendor:camodel:protection suitesscope:eqversion:r3

Trust: 1.6

vendor:camodel:internet security suite plus 2008scope: - version: -

Trust: 1.4

vendor:camodel:internet security suite plus 2009scope: - version: -

Trust: 1.4

vendor:camodel:threat manager total defensescope: - version: -

Trust: 1.4

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:11

Trust: 1.0

vendor:broadcommodel:internet security suitescope:eqversion:3.0

Trust: 1.0

vendor:camodel:etrust anti-virus gatewayscope:eqversion:7.1

Trust: 1.0

vendor:camodel:etrust secure content managerscope:eqversion:8.0

Trust: 1.0

vendor:camodel:gateway securityscope:eqversion:r8.1

Trust: 1.0

vendor:camodel:internet security suite 2008scope:eqversion:*

Trust: 1.0

vendor:broadcommodel:secure content managerscope:eqversion:1.1

Trust: 1.0

vendor:camodel:etrust intrusion detectionscope:eqversion:3.0

Trust: 1.0

vendor:camodel:arcserve backupscope:eqversion:r11.1

Trust: 1.0

vendor:camodel:etrust ez antivirusscope:eqversion:r7.1

Trust: 1.0

vendor:broadcommodel:internet security suitescope:eqversion:*

Trust: 1.0

vendor:broadcommodel:anti-virus for the enterprisescope:eqversion:7.1

Trust: 1.0

vendor:broadcommodel:etrust antivirusscope:eqversion:7.1

Trust: 1.0

vendor:broadcommodel:secure content managerscope:eqversion:8.0

Trust: 1.0

vendor:broadcommodel:anti-virus for the enterprisescope:eqversion:r8

Trust: 1.0

vendor:broadcommodel:network and systems managementscope:eqversion:r11.1

Trust: 1.0

vendor:camodel:etrust anti-virus sdkscope:eqversion:*

Trust: 1.0

vendor:broadcommodel:common servicesscope:eqversion:11.1

Trust: 1.0

vendor:camodel:anti-virus gatewayscope:eqversion:7.1

Trust: 1.0

vendor:camodel:internet security suite plus 2008scope:eqversion:*

Trust: 1.0

vendor:broadcommodel:etrust secure content managerscope:eqversion:1.1

Trust: 1.0

vendor:broadcommodel:network and systems managementscope:eqversion:r3.1

Trust: 1.0

vendor:broadcommodel:etrust integrated threat managementscope:eqversion:8.1

Trust: 1.0

vendor:camodel:etrust intrusion detectionscope:eqversion:2.0

Trust: 1.0

vendor:camodel:internet security suite plus 2009scope:eqversion:*

Trust: 1.0

vendor:broadcommodel:anti-virusscope:eqversion:2007

Trust: 1.0

vendor:broadcommodel:anti-virusscope:eqversion:2008

Trust: 1.0

vendor:broadcommodel:network and systems managementscope:eqversion:r3.0

Trust: 1.0

vendor:camodel:arcserve backupscope:eqversion:r11.5

Trust: 1.0

vendor:broadcommodel:common servicesscope:eqversion:11

Trust: 1.0

vendor:camodel:threat manager total defensescope:eqversion:*

Trust: 1.0

vendor:broadcommodel:etrust antivirusscope:eqversion:8

Trust: 1.0

vendor:broadcommodel:network and systems managementscope:eqversion:r11

Trust: 1.0

vendor:broadcommodel:etrust antivirusscope:eqversion:8.1

Trust: 1.0

vendor:camodel:arcserve for windows client agentscope:eqversion:*

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:11.1

Trust: 1.0

vendor:camodel:anti-virusscope:eqversion:2009

Trust: 1.0

vendor:camodel:common servicesscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:etrust intrusion detectionscope:eqversion:3.0

Trust: 1.0

vendor:camodel:arcserve for windows server componentscope:eqversion:*

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:3.0

Trust: 1.0

vendor:camodel:anti-virus for the enterprisescope:eqversion:r8.1

Trust: 1.0

vendor:broadcommodel:anti-virus sdkscope:eqversion:*

Trust: 1.0

vendor:camodel:anti-virusscope: - version: -

Trust: 0.8

vendor:camodel:anti-virus for the enterprisescope: - version: -

Trust: 0.8

vendor:camodel:anti-virus gatewayscope: - version: -

Trust: 0.8

vendor:camodel:anti-virus sdkscope: - version: -

Trust: 0.8

vendor:camodel:arcserve backupscope: - version: -

Trust: 0.8

vendor:camodel:arcserve for windows client agentscope: - version: -

Trust: 0.8

vendor:camodel:arcserve for windows server componentscope: - version: -

Trust: 0.8

vendor:camodel:common servicesscope: - version: -

Trust: 0.8

vendor:camodel:etrust intrusion detectionscope: - version: -

Trust: 0.8

vendor:camodel:gateway securityscope: - version: -

Trust: 0.8

vendor:camodel:internet security suitescope: - version: -

Trust: 0.8

vendor:camodel:network and systems managementscope: - version: -

Trust: 0.8

vendor:camodel:protection suitesscope: - version: -

Trust: 0.8

vendor:camodel:secure content managerscope: - version: -

Trust: 0.8

vendor:camodel:threat manager for the enterprisescope: - version: -

Trust: 0.8

vendor:camodel:etrust ez antivirusscope: - version: -

Trust: 0.8

vendor:camodel:etrust integrated threat managementscope:eqversion:8.1

Trust: 0.6

vendor:camodel:secure content managerscope:eqversion:1.1

Trust: 0.6

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates threat manager total defensescope:eqversion:0

Trust: 0.3

vendor:computermodel:associates threat manager for the enterprise r8.1scope: - version: -

Trust: 0.3

vendor:computermodel:associates threat manager for the enterprise r8scope: - version: -

Trust: 0.3

vendor:computermodel:associates protection suites r2scope:eqversion:0

Trust: 0.3

vendor:computermodel:associates protection suites r3scope: - version: -

Trust: 0.3

vendor:computermodel:associates protection suitesscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates internet security suite plusscope:eqversion:20090

Trust: 0.3

vendor:computermodel:associates internet security suite plusscope:eqversion:20080

Trust: 0.3

vendor:computermodel:associates internet security suitescope:eqversion:20080

Trust: 0.3

vendor:computermodel:associates internet security suitescope:eqversion:20073.0

Trust: 0.3

vendor:computermodel:associates gateway securityscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates etrust intrusion detection spscope:eqversion:3.01

Trust: 0.3

vendor:computermodel:associates etrust intrusion detectionscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates etrust intrusion detection sp1scope:eqversion:2.0.0

Trust: 0.3

vendor:computermodel:associates etrust ez antivirusscope:eqversion:7.1

Trust: 0.3

vendor:computermodel:associates common services r11.1scope: - version: -

Trust: 0.3

vendor:computermodel:associates common services r11scope: - version: -

Trust: 0.3

vendor:computermodel:associates common servicesscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup for windowsscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup for windowsscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup for windowsscope:eqversion:12.5

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup for windowsscope:eqversion:12.0

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup r12.0 windows sp1scope: - version: -

Trust: 0.3

vendor:computermodel:associates arcserve backup for linux sp3scope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates arcserve backup for linux sp2scope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates arcserve backup for linux sp1scope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates arcserve backup for linux gascope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates arcserve backup for linux sp3scope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates arcserve backup for linux sp2scope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates arcserve backup for linux sp1scope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates arcserve backup for linux gascope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates anti-virus sdkscope:eqversion:0

Trust: 0.3

vendor:computermodel:associates anti-virus gatewayscope:eqversion:7.1

Trust: 0.3

vendor:computermodel:associates anti-virus for the enterprise r8.1scope: - version: -

Trust: 0.3

vendor:computermodel:associates anti-virus for the enterprise r8scope: - version: -

Trust: 0.3

vendor:computermodel:associates anti-virus for the enterprisescope:eqversion:7.1

Trust: 0.3

vendor:computermodel:associates anti-virus plusscope:eqversion:20090

Trust: 0.3

vendor:computermodel:associates anti-virusscope:eqversion:20090

Trust: 0.3

vendor:computermodel:associates anti-virusscope:eqversion:20078

Trust: 0.3

vendor:computermodel:associates anti-virusscope:eqversion:2008

Trust: 0.3

sources: BID: 36653 // JVNDB: JVNDB-2009-002628 // CNNVD: CNNVD-200910-199 // NVD: CVE-2009-3587

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-3587
value: HIGH

Trust: 1.0

NVD: CVE-2009-3587
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200910-199
value: CRITICAL

Trust: 0.6

VULHUB: VHN-41033
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-3587
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-41033
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-41033 // JVNDB: JVNDB-2009-002628 // CNNVD: CNNVD-200910-199 // NVD: CVE-2009-3587

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2009-3587

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 81918 // CNNVD: CNNVD-200910-199

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200910-199

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002628

PATCH

title:218878url:http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878

Trust: 0.8

sources: JVNDB: JVNDB-2009-002628

EXTERNAL IDS

db:NVDid:CVE-2009-3587

Trust: 3.0

db:BIDid:36653

Trust: 2.8

db:SECUNIAid:36976

Trust: 2.6

db:OSVDBid:58691

Trust: 2.5

db:VUPENid:ADV-2009-2852

Trust: 2.5

db:SECTRACKid:1022999

Trust: 2.5

db:XFid:53697

Trust: 0.8

db:JVNDBid:JVNDB-2009-002628

Trust: 0.8

db:CNNVDid:CNNVD-200910-199

Trust: 0.7

db:PACKETSTORMid:81918

Trust: 0.2

db:PACKETSTORMid:81986

Trust: 0.2

db:VULHUBid:VHN-41033

Trust: 0.1

db:PACKETSTORMid:81885

Trust: 0.1

sources: VULHUB: VHN-41033 // BID: 36653 // JVNDB: JVNDB-2009-002628 // PACKETSTORM: 81918 // PACKETSTORM: 81885 // PACKETSTORM: 81986 // CNNVD: CNNVD-200910-199 // NVD: CVE-2009-3587

REFERENCES

url:http://www.securityfocus.com/bid/36653

Trust: 2.5

url:http://osvdb.org/58691

Trust: 2.5

url:http://www.securitytracker.com/id?1022999

Trust: 2.5

url:http://secunia.com/advisories/36976

Trust: 2.5

url:http://www.vupen.com/english/advisories/2009/2852

Trust: 2.5

url:http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentid=218878

Trust: 2.2

url:http://www.securityfocus.com/archive/1/507068/100/0/threaded

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/53697

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3587

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/53697

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3587

Trust: 0.8

url:http://blog.g-sec.lu/2009/10/computer-associates-multiple-products.html

Trust: 0.4

url:http://www.ca.com

Trust: 0.4

url:/archive/1/507101

Trust: 0.3

url:/archive/1/507068

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-3588

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-3587

Trust: 0.2

url:http://support.ca.com/.

Trust: 0.1

url:https://www.g-sec.lu

Trust: 0.1

url:http://www.ca.com/us/contact/

Trust: 0.1

url:http://www.ca.com/us/legal/

Trust: 0.1

url:http://www.ca.com/us/privacy/

Trust: 0.1

url:http://secunia.com/advisories/36976/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-41033 // BID: 36653 // JVNDB: JVNDB-2009-002628 // PACKETSTORM: 81918 // PACKETSTORM: 81885 // PACKETSTORM: 81986 // CNNVD: CNNVD-200910-199 // NVD: CVE-2009-3587

CREDITS

Thierry Zoller

Trust: 1.0

sources: BID: 36653 // PACKETSTORM: 81986 // CNNVD: CNNVD-200910-199

SOURCES

db:VULHUBid:VHN-41033
db:BIDid:36653
db:JVNDBid:JVNDB-2009-002628
db:PACKETSTORMid:81918
db:PACKETSTORMid:81885
db:PACKETSTORMid:81986
db:CNNVDid:CNNVD-200910-199
db:NVDid:CVE-2009-3587

LAST UPDATE DATE

2024-11-23T20:43:32.342000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-41033date:2021-11-15T00:00:00
db:BIDid:36653date:2009-10-13T15:38:00
db:JVNDBid:JVNDB-2009-002628date:2010-12-27T00:00:00
db:CNNVDid:CNNVD-200910-199date:2021-04-08T00:00:00
db:NVDid:CVE-2009-3587date:2024-11-21T01:07:44.420

SOURCES RELEASE DATE

db:VULHUBid:VHN-41033date:2009-10-13T00:00:00
db:BIDid:36653date:2009-10-09T00:00:00
db:JVNDBid:JVNDB-2009-002628date:2010-12-27T00:00:00
db:PACKETSTORMid:81918date:2009-10-12T20:41:50
db:PACKETSTORMid:81885date:2009-10-12T11:21:41
db:PACKETSTORMid:81986date:2009-10-14T23:09:22
db:CNNVDid:CNNVD-200910-199date:2009-10-13T00:00:00
db:NVDid:CVE-2009-3587date:2009-10-13T10:30:00.610