Vulnerabilities > CVE-2005-1693

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Integer overflow in Computer Associates Vet Antivirus library, as used by CA InoculateIT 6.0, eTrust Antivirus r6.0 through 7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, BrightStor ARCserve Backup (BAB) r11.1, Vet Antivirus, Zonelabs ZoneAlarm Security Suite, and ZoneAlarm Antivirus, allows remote attackers to gain privileges via a compressed VBA directory with a project name length of -1, which leads to a heap-based buffer overflow.

Nessus

NASL familyWindows
NASL idCA_VET_OVERFLOW.NASL
descriptionThe remote host is running a version of CA Vet Scan Engine that is vulnerable to heap overflow. An attacker may exploit this flaw to execute arbitrary code on the remote host with the privileges of a local administrator or to disable the remote service remotely. To exploit this flaw, an attacker would need to send a specially- crafted file to the remote antivirus library.
last seen2020-06-01
modified2020-06-02
plugin id20174
published2005-11-09
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20174
titleCA Vet Scan Engine < 11.9.1 Library Remote Heap Overflow
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
 script_id(20174);
 script_version("1.18");
 script_cvs_date("Date: 2018/11/15 20:50:26");

 script_cve_id("CVE-2005-1693");
 script_bugtraq_id(13710);

 script_name(english:"CA Vet Scan Engine < 11.9.1 Library Remote Heap Overflow");
 script_summary(english:"Determines the version of CA Vet Scan Engine");

 script_set_attribute(attribute:"synopsis", value:"The remote antivirus application allows execution of arbitrary code.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of CA Vet Scan Engine that is
vulnerable to heap overflow. An attacker may exploit this flaw to
execute arbitrary code on the remote host with the privileges of a
local administrator or to disable the remote service remotely.

To exploit this flaw, an attacker would need to send a specially-
crafted file to the remote antivirus library.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2005/May/258");
 # https://web.archive.org/web/20050525161449/http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32896
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0e3fa8db");
 script_set_attribute(attribute:"solution", value:
"Install the latest virus definitions and ensure that the Vet engine is
version 11.9.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2005/05/23");
 script_set_attribute(attribute:"plugin_publication_date", value:"2005/11/09");

script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows");
 script_dependencies("smb_hotfixes.nasl");
 script_require_keys("SMB/Registry/Enumerated");
 script_require_ports(139, 445);
 exit(0);
}

#

include("smb_func.inc");
include("audit.inc");


if ( ! get_kb_item("SMB/Registry/Enumerated") ) exit(1);


name 	=  kb_smb_name();
login	=  kb_smb_login();
pass  	=  kb_smb_password();
domain 	=  kb_smb_domain();
port    =  kb_smb_transport();


if(! smb_session_init()) audit(AUDIT_FN_FAIL, 'smb_session_init');
r = NetUseAdd(login:login, password:pass, domain:domain, share:"IPC$");

hklm = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE);
if ( isnull(hklm) )
{
 NetUseDel();
 exit(1);
}

key_h = RegOpenKey(handle:hklm, key:"SOFTWARE\ComputerAssociates\ScanEngine\Path", mode:MAXIMUM_ALLOWED);
if ( isnull(key_h) )
{
 RegCloseKey(handle:hklm);
 NetUseDel();
 exit(0);
}

value = RegQueryValue(handle:key_h, item:"Engine");
RegCloseKey(handle:key_h);
RegCloseKey(handle:hklm);
if ( isnull(value) )
{
 NetUseDel();
 exit(0);
}


share = ereg_replace(pattern:"^([A-Za-z]):.*", replace:"\1$", string:value[1]);
exe =  ereg_replace(pattern:"^[A-Za-z]:(.*)", replace:"\1\VetE.dll", string:value[1]);
NetUseDel(close:FALSE);

r = NetUseAdd(login:login, password:pass, domain:domain, share:share);
if ( r != 1 ) {
 NetUseDel();
 exit(1);
}

handle = CreateFile (file:exe, desired_access:GENERIC_READ, file_attributes:FILE_ATTRIBUTE_NORMAL, share_mode:FILE_SHARE_READ, create_disposition:OPEN_EXISTING);

if ( ! isnull(handle) )
{
 v = GetFileVersion(handle:handle);
 CloseFile(handle:handle);
 if (!isnull(v))
 if ( ( v[0] < 11 ) ||
      ( ( v[0] == 11 ) && ( v[1] < 9 ) ) ||
      ( ( v[0] == 11 ) && ( v[1] == 9 ) && ( v[2] < 1 ) ) )
    security_hole(port);
}

NetUseDel();