SupportConnect - CA Anti-Virus for the Enterprise / CA Threat Manager / CA Anti-Spyware Security Notice

CA Anti-Virus for the Enterprise
CA Threat Manager for the Enterprise
CA Anti-Spyware for the Enterprise
Security Notice

Last Updated: May 12, 2007

CA's customer support is alerting customers to multiple security risks affecting CA Anti-Virus for the Enterprise, CA Threat Manager, and CA Anti-Spyware. Two vulnerabilities exist that can allow a remote attacker to cause a denial of service condition or possibly execute arbitrary code. CA has issued an update to address the vulnerabilities.

The first vulnerability, CVE-2007-2522, is due to insufficient bounds checking on Console Server login credentials. A remote attacker can use carefully constructed authentication credentials to cause a stack based buffer overflow, which can potentially result in arbitrary code execution.

The second vulnerability, CVE-2007-2523, is due to insufficient bounds checking in InoCore.dll. A local attacker can modify the contents of a file mapping to cause a stack based buffer overflow, which can potentially result in arbitrary code execution. This issue only affects CA Anti-Virus for the Enterprise and CA Threat Manager.

Mitigating Factors

For CVE-2007-2522, the vulnerability applies only to an installation on the x86 platform with the Console Server installed.

Risk Rating

High

Affected Products

CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8
CA Threat Manager for the Enterprise (formerly eTrust Integrated Threat Management) r8
CA Anti-Spyware for the Enterprise (formerly eTrust PestPatrol) r8
CA Protection Suites r3

How to determine if the installation is affected

  1. Using Windows Explorer, locate the files "InoWeb.exe" and "InoCore.dll". By default, the files are located in the "C:\Program Files\CA\eTrustITM" directory.
  2. Right click on each of the files and select Properties.
  3. Select the Version tab (or the Details tab if you are using Windows Vista).
  4. If either file version is earlier than indicated in the below table, the installation is vulnerable.
File Name File Version
InoWeb.exe 8.0.448.0
InoCore.dll 8.0.448.0

Solution

CA has issued an update to address the vulnerabilities. The patched files are available as part of the product's automatic content update. The following components must be enabled in order to receive these updates: eTrust ITM Console Server for InoWeb.exe and eTrust ITM Common for InoCore.dll.

Workaround

In the instance where updating the product is not immediately feasible, the following workaround can be used as a temporary measure to reduce exposure.

For CVE-2007-2522, filter access to TCP port 12168.

References

CVE-2007-2522 Console Server authentication credential buffer overflow

CVE-2007-2523 File mapping buffer overflow

Acknowledgement

CVE-2007-2522 - Tenable Network Security, working with TippingPoint (www.tippingpoint.com) and the Zero Day Initiative (www.zerodayintiative.com)

CVE-2007-2523 - binagres, working with iDefense (labs.idefense.com)

Change History

Version 1.0: Initial Release

Version 1.1: Modified Affected Products section to include CA Protection Suites r3

Version 1.2: Corrected step 3 in How to determine if the installation is affected

If additional information is required, please contact CA Technical Support at http://supportconnect.ca.com.

If you discover a vulnerability in CA products, please report your findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability" form at http://www3.ca.com/us/securityadvisor/vulninfo/submit.aspx.