Computer Security
[EN] securityvulns.ru no-pyccku


CA Antivirus protection bypass
Published:28.01.2009
Source:
SecurityVulns ID:9624
Type:remote
Threat Level:
3/10
Description:Invalid archives handling.
Affected:CA : eTrust Intrusion Detection 3.0
 CA : CA Internet Security Suite 2007
 CA : CA Anti-Spyware 8
 CA : CA Internet Security Suite 2008
 CA : CA Anti-Virus 7.1
 CA : CA Anti-Virus 8
 CA : CA Anti-Virus 8.1
 CA : CA Anti-Virus 2007
 CA : CA Anti-Virus 2008
 CA : eTrust EZ Antivirus 7
 CA : eTrust EZ Antivirus 6.1
 CA : CA Threat Manager for the Enterprise 8
 CA : CA Threat Manager for the Enterprise 8.1
 CA : CA Anti-Virus Gateway 7.1
 CA : CA Protection Suite 3.1
 CA : CA Anti-Spyware 8.1
 CA : CA Anti-Spyware 2007
 CA : CA Anti-Spyware 2008
 CA : CA Network and Systems Management 3.0
 CA : CA Network and Systems Management 3.1
 CA : CA Network and Systems Management 11
 CA : CA Network and Systems Management 11.1
 CA : CA ARCserve Backup 11.1
 CA : CA ARCserve Backup 11.5
 CA : CA ARCserve Backup 12
 CA : eTrust Intrusion Detection 2.0
 CA : eTrust Intrusion Detection 4.0
CVE:CVE-2009-0042 (Multiple unspecified vulnerabilities in the Arclib library (arclib.dll) before 7.3.0.15 in the CA Anti-Virus engine for CA Anti-Virus for the Enterprise 7.1, r8, and r8.1; Anti-Virus 2007 v8 and 2008; Internet Security Suite 2007 v3 and 2008; and other CA products allow remote attackers to bypass virus detection via a malformed archive file.)
Original documentdocumentCA, CA20090126-01: CA Anti-Virus Engine Detection Evasion Multiple Vulnerabilities (28.01.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod