Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Internet_security_suite_plus_2008
(Ca)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2009-10-13 | CVE-2009-3587 | Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588. | Anti\-Virus, Anti\-Virus_for_the_enterprise, Anti\-Virus_sdk, Common_services, Etrust_antivirus, Etrust_integrated_threat_management, Etrust_intrusion_detection, Etrust_secure_content_manager, Internet_security_suite, Network_and_systems_management, Secure_content_manager, Unicenter_network_and_systems_management, Anti\-Virus, Anti\-Virus_for_the_enterprise, Anti\-Virus_gateway, Anti\-Virus_plus, Arcserve_backup, Arcserve_for_windows_client_agent, Arcserve_for_windows_server_component, Common_services, Etrust_anti\-Virus_gateway, Etrust_anti\-Virus_sdk, Etrust_ez_antivirus, Etrust_intrusion_detection, Etrust_secure_content_manager, Gateway_security, Internet_security_suite_2008, Internet_security_suite_plus_2008, Internet_security_suite_plus_2009, Protection_suites, Threat_manager, Threat_manager_total_defense | N/A | ||
2009-10-13 | CVE-2009-3588 | Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587. | Anti\-Virus, Anti\-Virus_for_the_enterprise, Anti\-Virus_sdk, Arcserve_backup, Common_services, Etrust_antivirus, Etrust_integrated_threat_management, Etrust_intrusion_detection, Etrust_secure_content_manager, Internet_security_suite, Network_and_systems_management, Secure_content_manager, Unicenter_network_and_systems_management, Anti\-Virus, Anti\-Virus_for_the_enterprise, Anti\-Virus_gateway, Anti\-Virus_plus, Arcserve_backup, Arcserve_for_windows_client_agent, Arcserve_for_windows_server_component, Common_services, Etrust_anti\-Virus_gateway, Etrust_anti\-Virus_sdk, Etrust_ez_antivirus, Etrust_intrusion_detection, Etrust_secure_content_manager, Gateway_security, Internet_security_suite_2008, Internet_security_suite_plus_2008, Internet_security_suite_plus_2009, Protection_suites, Threat_manager, Threat_manager_total_defense | N/A | ||
2009-01-28 | CVE-2009-0042 | Multiple unspecified vulnerabilities in the Arclib library (arclib.dll) before 7.3.0.15 in the CA Anti-Virus engine for CA Anti-Virus for the Enterprise 7.1, r8, and r8.1; Anti-Virus 2007 v8 and 2008; Internet Security Suite 2007 v3 and 2008; and other CA products allow remote attackers to bypass virus detection via a malformed archive file. | Anti\-Spyware, Anti\-Spyware_for_the_enterprise, Anti\-Virus, Anti\-Virus_for_the_enterprise, Anti\-Virus_sdk, Antivirus_gateway, Arcserve_client_agent, Common_services, Etrust_ez_antivirus, Etrust_intrusion_detection, Network_and_systems_management, Secure_content_manager, Arcserve_backup, Etrust_intrusion_detection, Internet_security_suite_2007, Internet_security_suite_2008, Internet_security_suite_plus_2008, Protection_suites, Threat_manager_for_the_enterprise | N/A | ||
2008-06-02 | CVE-2008-2511 | Directory traversal vulnerability in the UmxEventCli.CachedAuditDataList.1 (aka UmxEventCliLib) ActiveX control in UmxEventCli.dll in CA Internet Security Suite 2008 allows remote attackers to create and overwrite arbitrary files via a .. (dot dot) in the argument to the SaveToFile method. NOTE: this can be leveraged for code execution by writing to a Startup folder. NOTE: some of these details are obtained from third party information. | Internet_security_suite_plus_2008 | N/A |