Vulnerabilities > CVE-2007-2864
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.
Vulnerable Configurations
Exploit-Db
description | CA Antivirus Engine CAB Buffer Overflow. CVE-2007-2864. Local exploit for windows platform |
id | EDB-ID:16677 |
last seen | 2016-02-02 |
modified | 2010-11-11 |
published | 2010-11-11 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16677/ |
title | CA Antivirus Engine CAB Buffer Overflow |
Metasploit
description | This module exploits a stack buffer overflow in CA eTrust Antivirus 8.1.637. By creating a specially crafted CAB file, an attacker may be able to execute arbitrary code. |
id | MSF:EXPLOIT/WINDOWS/FILEFORMAT/CA_CAB |
last seen | 2020-03-10 |
modified | 2020-01-15 |
published | 2009-08-27 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2864 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/fileformat/ca_cab.rb |
title | CA Antivirus Engine CAB Buffer Overflow |
Packetstorm
data source | https://packetstormsecurity.com/files/download/83164/ca_cab.rb.txt |
id | PACKETSTORM:83164 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | MC |
source | https://packetstormsecurity.com/files/83164/CA-Antivirus-Engine-CAB-Buffer-Overflow.html |
title | CA Antivirus Engine CAB Buffer Overflow |
Saint
bid | 24330 |
description | CA Antivirus engine CAB handling buffer overflow |
id | misc_av_cacab |
osvdb | 35245 |
title | ca_antivirus_cab |
type | client |
References
- http://secunia.com/advisories/25570
- http://secunia.com/advisories/25570
- http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp
- http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp
- http://www.kb.cert.org/vuls/id/105105
- http://www.kb.cert.org/vuls/id/105105
- http://www.osvdb.org/35245
- http://www.osvdb.org/35245
- http://www.securityfocus.com/archive/1/470602/100/0/threaded
- http://www.securityfocus.com/archive/1/470602/100/0/threaded
- http://www.securityfocus.com/archive/1/470754/100/0/threaded
- http://www.securityfocus.com/archive/1/470754/100/0/threaded
- http://www.securityfocus.com/bid/24330
- http://www.securityfocus.com/bid/24330
- http://www.securitytracker.com/id?1018199
- http://www.securitytracker.com/id?1018199
- http://www.vupen.com/english/advisories/2007/2072
- http://www.vupen.com/english/advisories/2007/2072
- http://www.zerodayinitiative.com/advisories/ZDI-07-035.html
- http://www.zerodayinitiative.com/advisories/ZDI-07-035.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34737
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34737