ID CVE-2009-0042
Summary Multiple unspecified vulnerabilities in the Arclib library (arclib.dll) before 7.3.0.15 in the CA Anti-Virus engine for CA Anti-Virus for the Enterprise 7.1, r8, and r8.1; Anti-Virus 2007 v8 and 2008; Internet Security Suite 2007 v3 and 2008; and other CA products allow remote attackers to bypass virus detection via a malformed archive file.
References
Vulnerable Configurations
  • cpe:2.3:a:broadcom:anti-spyware:2007:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:anti-spyware:2007:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:anti-spyware:2008:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:anti-spyware:2008:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:anti-spyware_for_the_enterprise:8.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:anti-spyware_for_the_enterprise:8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:anti-spyware_for_the_enterprise:r8:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:anti-spyware_for_the_enterprise:r8:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:anti-virus:2007:8:*:*:*:*:*:*
    cpe:2.3:a:broadcom:anti-virus:2007:8:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:anti-virus:2008:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:anti-virus:2008:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:r8:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:r8:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:anti-virus_sdk:*:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:anti-virus_sdk:*:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:antivirus_gateway:7.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:antivirus_gateway:7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:arcserve_client_agent:-:*:windows:*:*:*:*:*
    cpe:2.3:a:broadcom:arcserve_client_agent:-:*:windows:*:*:*:*:*
  • cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:etrust_ez_antivirus:r6.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:etrust_ez_antivirus:r6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:etrust_ez_antivirus:r7:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:etrust_ez_antivirus:r7:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:etrust_intrusion_detection:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:etrust_intrusion_detection:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:network_and_systems_management:r3.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:network_and_systems_management:r3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:network_and_systems_management:r3.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:network_and_systems_management:r3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:network_and_systems_management:r11:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:network_and_systems_management:r11:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:network_and_systems_management:r11.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:network_and_systems_management:r11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:secure_content_manager:8.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:secure_content_manager:8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ca:arcserve_backup:r11.1:_nil_:linux:*:*:*:*:*
    cpe:2.3:a:ca:arcserve_backup:r11.1:_nil_:linux:*:*:*:*:*
  • cpe:2.3:a:ca:arcserve_backup:r11.1:_nil_:windows:*:*:*:*:*
    cpe:2.3:a:ca:arcserve_backup:r11.1:_nil_:windows:*:*:*:*:*
  • cpe:2.3:a:ca:arcserve_backup:r11.5_nil_:linux:*:*:*:*:*:*
    cpe:2.3:a:ca:arcserve_backup:r11.5_nil_:linux:*:*:*:*:*:*
  • cpe:2.3:a:ca:arcserve_backup:r11.5_nil_:windows:*:*:*:*:*:*
    cpe:2.3:a:ca:arcserve_backup:r11.5_nil_:windows:*:*:*:*:*:*
  • cpe:2.3:a:ca:arcserve_backup:r12.0_nil_:windows:*:*:*:*:*:*
    cpe:2.3:a:ca:arcserve_backup:r12.0_nil_:windows:*:*:*:*:*:*
  • cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*
    cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*
  • cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*
    cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*
  • cpe:2.3:a:ca:internet_security_suite_2007:3:*:*:*:*:*:*:*
    cpe:2.3:a:ca:internet_security_suite_2007:3:*:*:*:*:*:*:*
  • cpe:2.3:a:ca:internet_security_suite_2008:*:*:*:*:*:*:*:*
    cpe:2.3:a:ca:internet_security_suite_2008:*:*:*:*:*:*:*:*
  • cpe:2.3:a:ca:internet_security_suite_plus_2008:*:*:*:*:*:*:*:*
    cpe:2.3:a:ca:internet_security_suite_plus_2008:*:*:*:*:*:*:*:*
  • cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*
    cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*
  • cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*
    cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*
  • cpe:2.3:a:ca:protection_suites:r3.1:*:*:*:*:*:*:*
    cpe:2.3:a:ca:protection_suites:r3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ca:threat_manager_for_the_enterprise:8.1:*:*:*:*:*:*:*
    cpe:2.3:a:ca:threat_manager_for_the_enterprise:8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ca:threat_manager_for_the_enterprise:r8:*:*:*:*:*:*:*
    cpe:2.3:a:ca:threat_manager_for_the_enterprise:r8:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 09-04-2021 - 18:53)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 33464
bugtraq 20090127 CA20090126-01: CA Anti-Virus Engine Detection Evasion Multiple Vulnerabilities
confirm
sectrack 1021639
vupen ADV-2009-0270
xf ca-antivirus-engine-security-bypass(48261)
Last major update 09-04-2021 - 18:53
Published 28-01-2009 - 01:30
Last modified 09-04-2021 - 18:53
Back to Top