Vulnerabilities > CVE-2007-2523
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
CA Anti-Virus for the Enterprise r8 and Threat Manager r8 before 20070510 use weak permissions (NULL security descriptor) for the Task Service shared file mapping, which allows local users to modify this mapping and gain privileges by triggering a stack-based buffer overflow in InoCore.dll before 8.0.448.0. The Computer Associates Integrated Threat Manager product is only vulnerable if it is release 8.0 before 2007-05-10.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 |
Exploit-Db
description | CA Multiple Products Console Server and InoCore.dll Remote Code Execution Vulnerabilities. CVE-2007-2523. Remote exploit for windows platform |
id | EDB-ID:30019 |
last seen | 2016-02-03 |
modified | 2007-05-09 |
published | 2007-05-09 |
reporter | binagres |
source | https://www.exploit-db.com/download/30019/ |
title | CA Multiple Products Console Server and InoCore.dll - Remote Code Execution Vulnerabilities |
Nessus
NASL family | Windows |
NASL id | CA_INOTASK_OVERFLOW.NASL |
description | The version of CA Anti-Virus for the Enterprise / Threat Manager installed on the remote host is affected by a stack-based buffer overflow involving its task service, InoTask.exe. By supplying a long path to the file job |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25218 |
published | 2007-05-16 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25218 |
title | CA Multiple Products InoCore.dll File Mapping Manipulation Local Overflow |
Saint
bid | 23906 |
description | CA Console Server username buffer overflow |
id | misc_av_caetrustitm |
osvdb | 34585 |
title | ca_console_login |
type | remote |
References
- http://blog.48bits.com/?p=103
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=530
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063275.html
- http://secunia.com/advisories/25202
- http://supportconnectw.ca.com/public/antivirus/infodocs/caav-secnotice050807.asp
- http://www.kb.cert.org/vuls/id/788416
- http://www.osvdb.org/34586
- http://www.securityfocus.com/archive/1/468306/100/0/threaded
- http://www.securityfocus.com/bid/23906
- http://www.securitytracker.com/id?1018043
- http://www.vupen.com/english/advisories/2007/1750