Информационная безопасность
[RU] switch to English


Обход защиты в CA Antivirus
Опубликовано:28 января 2009 г.
Источник:
SecurityVulns ID:9624
Тип:удаленная
Уровень опасности:
3/10
Описание:Некорректная работа с архивами.
Затронутые продукты:CA : eTrust Intrusion Detection 3.0
 CA : CA Internet Security Suite 2007
 CA : CA Anti-Spyware 8
 CA : CA Internet Security Suite 2008
 CA : CA Anti-Virus 7.1
 CA : CA Anti-Virus 8
 CA : CA Anti-Virus 8.1
 CA : CA Anti-Virus 2007
 CA : CA Anti-Virus 2008
 CA : eTrust EZ Antivirus 7
 CA : eTrust EZ Antivirus 6.1
 CA : CA Threat Manager for the Enterprise 8
 CA : CA Threat Manager for the Enterprise 8.1
 CA : CA Anti-Virus Gateway 7.1
 CA : CA Protection Suite 3.1
 CA : CA Anti-Spyware 8.1
 CA : CA Anti-Spyware 2007
 CA : CA Anti-Spyware 2008
 CA : CA Network and Systems Management 3.0
 CA : CA Network and Systems Management 3.1
 CA : CA Network and Systems Management 11
 CA : CA Network and Systems Management 11.1
 CA : CA ARCserve Backup 11.1
 CA : CA ARCserve Backup 11.5
 CA : CA ARCserve Backup 12
 CA : eTrust Intrusion Detection 2.0
 CA : eTrust Intrusion Detection 4.0
CVE:CVE-2009-0042 (Multiple unspecified vulnerabilities in the Arclib library (arclib.dll) before 7.3.0.15 in the CA Anti-Virus engine for CA Anti-Virus for the Enterprise 7.1, r8, and r8.1; Anti-Virus 2007 v8 and 2008; Internet Security Suite 2007 v3 and 2008; and other CA products allow remote attackers to bypass virus detection via a malformed archive file.)
Оригинальный текстdocumentCA, CA20090126-01: CA Anti-Virus Engine Detection Evasion Multiple Vulnerabilities (28.01.2009)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород