Vulnerabilities > CVE-2005-1693

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
broadcom
ca
zonelabs
critical
nessus

Summary

Integer overflow in Computer Associates Vet Antivirus library, as used by CA InoculateIT 6.0, eTrust Antivirus r6.0 through 7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, BrightStor ARCserve Backup (BAB) r11.1, Vet Antivirus, Zonelabs ZoneAlarm Security Suite, and ZoneAlarm Antivirus, allows remote attackers to gain privileges via a compressed VBA directory with a project name length of -1, which leads to a heap-based buffer overflow.

Nessus

NASL familyWindows
NASL idCA_VET_OVERFLOW.NASL
descriptionThe remote host is running a version of CA Vet Scan Engine that is vulnerable to heap overflow. An attacker may exploit this flaw to execute arbitrary code on the remote host with the privileges of a local administrator or to disable the remote service remotely. To exploit this flaw, an attacker would need to send a specially- crafted file to the remote antivirus library.
last seen2020-06-01
modified2020-06-02
plugin id20174
published2005-11-09
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20174
titleCA Vet Scan Engine < 11.9.1 Library Remote Heap Overflow
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
 script_id(20174);
 script_version("1.18");
 script_cvs_date("Date: 2018/11/15 20:50:26");

 script_cve_id("CVE-2005-1693");
 script_bugtraq_id(13710);

 script_name(english:"CA Vet Scan Engine < 11.9.1 Library Remote Heap Overflow");
 script_summary(english:"Determines the version of CA Vet Scan Engine");

 script_set_attribute(attribute:"synopsis", value:"The remote antivirus application allows execution of arbitrary code.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of CA Vet Scan Engine that is
vulnerable to heap overflow. An attacker may exploit this flaw to
execute arbitrary code on the remote host with the privileges of a
local administrator or to disable the remote service remotely.

To exploit this flaw, an attacker would need to send a specially-
crafted file to the remote antivirus library.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2005/May/258");
 # https://web.archive.org/web/20050525161449/http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32896
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0e3fa8db");
 script_set_attribute(attribute:"solution", value:
"Install the latest virus definitions and ensure that the Vet engine is
version 11.9.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2005/05/23");
 script_set_attribute(attribute:"plugin_publication_date", value:"2005/11/09");

script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows");
 script_dependencies("smb_hotfixes.nasl");
 script_require_keys("SMB/Registry/Enumerated");
 script_require_ports(139, 445);
 exit(0);
}

#

include("smb_func.inc");
include("audit.inc");


if ( ! get_kb_item("SMB/Registry/Enumerated") ) exit(1);


name 	=  kb_smb_name();
login	=  kb_smb_login();
pass  	=  kb_smb_password();
domain 	=  kb_smb_domain();
port    =  kb_smb_transport();


if(! smb_session_init()) audit(AUDIT_FN_FAIL, 'smb_session_init');
r = NetUseAdd(login:login, password:pass, domain:domain, share:"IPC$");

hklm = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE);
if ( isnull(hklm) )
{
 NetUseDel();
 exit(1);
}

key_h = RegOpenKey(handle:hklm, key:"SOFTWARE\ComputerAssociates\ScanEngine\Path", mode:MAXIMUM_ALLOWED);
if ( isnull(key_h) )
{
 RegCloseKey(handle:hklm);
 NetUseDel();
 exit(0);
}

value = RegQueryValue(handle:key_h, item:"Engine");
RegCloseKey(handle:key_h);
RegCloseKey(handle:hklm);
if ( isnull(value) )
{
 NetUseDel();
 exit(0);
}


share = ereg_replace(pattern:"^([A-Za-z]):.*", replace:"\1$", string:value[1]);
exe =  ereg_replace(pattern:"^[A-Za-z]:(.*)", replace:"\1\VetE.dll", string:value[1]);
NetUseDel(close:FALSE);

r = NetUseAdd(login:login, password:pass, domain:domain, share:share);
if ( r != 1 ) {
 NetUseDel();
 exit(1);
}

handle = CreateFile (file:exe, desired_access:GENERIC_READ, file_attributes:FILE_ATTRIBUTE_NORMAL, share_mode:FILE_SHARE_READ, create_disposition:OPEN_EXISTING);

if ( ! isnull(handle) )
{
 v = GetFileVersion(handle:handle);
 CloseFile(handle:handle);
 if (!isnull(v))
 if ( ( v[0] < 11 ) ||
      ( ( v[0] == 11 ) && ( v[1] < 9 ) ) ||
      ( ( v[0] == 11 ) && ( v[1] == 9 ) && ( v[2] < 1 ) ) )
    security_hole(port);
}

NetUseDel();