CVE-2009-3587
Vulnerability from cvelistv5
Published
2009-10-13 10:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "58691", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/58691" }, { "name": "36976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "ca-rar-code-execution(53697)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "58691", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/58691" }, { "name": "36976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "ca-rar-code-execution(53697)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3587", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878", "refsource": "CONFIRM", "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "58691", "refsource": "OSVDB", "url": "http://osvdb.org/58691" }, { "name": "36976", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "ca-rar-code-execution(53697)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36653" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3587", "datePublished": "2009-10-13T10:00:00", "dateReserved": "2009-10-08T00:00:00", "dateUpdated": "2024-08-07T06:31:10.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:anti-virus:2007:8:*:*:*:*:*:*\", \"matchCriteriaId\": \"C469EBBE-EE96-4CED-BD8C-36461750C6A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:anti-virus:2008:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C5E892B-0EE8-4B76-97B8-0BAF17E83F49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"607CCBDA-7288-4496-A7ED-EF6DED40CA21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:r8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11BCD267-E8CE-4A97-B769-5F4CAF9830D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:anti-virus_sdk:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"865B7BD2-3AD1-41CA-842B-47BC4F1426DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E2FA702-184A-44FF-8DEA-7811804EE175\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D301B65D-A20B-4991-A0D8-DFE3363F162B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A08C715-A351-466D-99EC-006C106A3366\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:etrust_antivirus:8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05185A74-8484-419D-A3CE-8603928AF0DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52C533CA-ACB7-4C0F-98E2-B5E51E24A554\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:etrust_integrated_threat_management:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FD8D5F0-9606-4BBA-B7F9-ACD089B84DC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DDF2EE3-753B-4C7E-84EF-144FA5986A21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69184A5E-4FA9-4896-B6E8-1B9D4D62D099\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:internet_security_suite:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F30C4FF9-DB76-4B3F-9582-752097B3D521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"285013A5-E058-4B2B-B8B6-1BFF72388589\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:network_and_systems_management:r3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF55705-42ED-4503-8534-FDEA365E84E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:network_and_systems_management:r3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB548763-E1A7-4DB1-BE86-ED5AA1CA81BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:network_and_systems_management:r11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B28429A-F343-4BE8-A94D-5A5AC3F6258C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:network_and_systems_management:r11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFF64064-1C35-4888-BBC2-52F68EF9517F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:secure_content_manager:1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DADD1E6-3454-4C1E-AD46-82D79CB8F528\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E02DA21-B25B-4626-BFDC-61AA8AF3537E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EFA39E3-A614-4A64-B29C-86D6F12F1557\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B4434A4-EE82-46A1-9293-345991515369\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43CD3B48-C978-4FDB-B157-85F3E971446B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:anti-virus:2009:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6050CADE-7BAF-45B7-A031-F70558C7CE44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:anti-virus_for_the_enterprise:r8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0186ADA-0E20-4E14-B9D5-19CDFC1BD98F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:anti-virus_gateway:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD75FF0F-A36C-40AF-A99E-1596A6A6FE2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:anti-virus_plus:2009:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BED8CEF9-6AEC-4771-98F7-051E4B3E0848\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:arcserve_for_windows_client_agent:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5603FDAD-A347-4A44-BC45-1ADC44601D65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:arcserve_for_windows_server_component:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5086D7CF-EBAB-4E30-98E0-0D276CC1C707\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:common_services:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FAD043E-3ABE-46D7-AD17-A68858692A7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:etrust_anti-virus_gateway:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C13B0E1-DCEE-46E5-81A3-C08C07C58B9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:etrust_anti-virus_sdk:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"257CC950-F1BB-4D0A-9B05-98A58DB67532\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:etrust_ez_antivirus:r7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0A641A2-4147-4C41-B102-18417ECA9339\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"29FEABEE-DC17-4620-B088-B24249865931\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D10B864B-AA39-4702-A42B-F33BAF2D8059\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DB54A16-5E56-46FC-A49C-56C98C0B8F1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:gateway_security:r8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B44F941C-83DC-4EDA-B258-C35F5EDA819E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:internet_security_suite_2008:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0281F80B-CF9C-482D-B7A9-3B2651BD0567\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:internet_security_suite_plus_2008:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33F7E184-EA23-487C-83ED-65CF8DD2DB18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:internet_security_suite_plus_2009:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"951062B1-C72B-4EAF-BA54-6986434036FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47C10BA4-B241-4F65-8FA1-AD88266C03B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"253A8082-9AE4-4049-A1D0-B7ACB5C2E8D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:protection_suites:r3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC845898-3D77-4793-971E-5E1555ED9CDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:threat_manager:8.1:*:enterprise:*:*:*:*:*\", \"matchCriteriaId\": \"0115D81C-2CA2-424C-BE4B-0896C9ADA68E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:threat_manager:r8:*:enterprise:*:*:*:*:*\", \"matchCriteriaId\": \"A38801CD-167E-408E-89BD-52BB1B89041B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:threat_manager_total_defense:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6AEE8BC-8D0E-464F-88B7-5C2C2D372AFA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:arcserve_backup:r11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8713893-59CE-486A-9262-E755A8F2D58C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad no especificada en el componente arclib en el motor Anti-Virus en CA Anti-Virus para Enterprise (formalmente eTrust Antivirus) v7.1 hasta v8.1; Anti-Virus 2007 (v8) hasta 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) hasta Plus 2009; y otros productos CA permite a atacantes remotos causar una denegaci\\u00f3n de servicio y ejecutar probablemente c\\u00f3digo de su elecci\\u00f3n a trav\\u00e9s del archivo RAR manipulado que provoca una corrupci\\u00f3n de la memoria din\\u00e1mica, una vulnerabilidad diferente que CVE-2009-3588.\"}]", "id": "CVE-2009-3587", "lastModified": "2024-11-21T01:07:44.420", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2009-10-13T10:30:00.610", "references": "[{\"url\": \"http://osvdb.org/58691\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/36976\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/507068/100/0/threaded\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/36653\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1022999\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2852\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/53697\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://osvdb.org/58691\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/36976\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/507068/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/36653\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1022999\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2852\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/53697\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2009-3587\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-10-13T10:30:00.610\",\"lastModified\":\"2024-11-21T01:07:44.420\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en el componente arclib en el motor Anti-Virus en CA Anti-Virus para Enterprise (formalmente eTrust Antivirus) v7.1 hasta v8.1; Anti-Virus 2007 (v8) hasta 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) hasta Plus 2009; y otros productos CA permite a atacantes remotos causar una denegaci\u00f3n de servicio y ejecutar probablemente c\u00f3digo de su elecci\u00f3n a trav\u00e9s del archivo RAR manipulado que provoca una corrupci\u00f3n de la memoria din\u00e1mica, una vulnerabilidad diferente que CVE-2009-3588.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:anti-virus:2007:8:*:*:*:*:*:*\",\"matchCriteriaId\":\"C469EBBE-EE96-4CED-BD8C-36461750C6A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:anti-virus:2008:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C5E892B-0EE8-4B76-97B8-0BAF17E83F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"607CCBDA-7288-4496-A7ED-EF6DED40CA21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:r8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11BCD267-E8CE-4A97-B769-5F4CAF9830D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:anti-virus_sdk:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"865B7BD2-3AD1-41CA-842B-47BC4F1426DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E2FA702-184A-44FF-8DEA-7811804EE175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D301B65D-A20B-4991-A0D8-DFE3363F162B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A08C715-A351-466D-99EC-006C106A3366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:etrust_antivirus:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05185A74-8484-419D-A3CE-8603928AF0DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C533CA-ACB7-4C0F-98E2-B5E51E24A554\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:etrust_integrated_threat_management:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD8D5F0-9606-4BBA-B7F9-ACD089B84DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DDF2EE3-753B-4C7E-84EF-144FA5986A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69184A5E-4FA9-4896-B6E8-1B9D4D62D099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:internet_security_suite:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F30C4FF9-DB76-4B3F-9582-752097B3D521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"285013A5-E058-4B2B-B8B6-1BFF72388589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:network_and_systems_management:r3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF55705-42ED-4503-8534-FDEA365E84E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:network_and_systems_management:r3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB548763-E1A7-4DB1-BE86-ED5AA1CA81BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:network_and_systems_management:r11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B28429A-F343-4BE8-A94D-5A5AC3F6258C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:network_and_systems_management:r11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF64064-1C35-4888-BBC2-52F68EF9517F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:secure_content_manager:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DADD1E6-3454-4C1E-AD46-82D79CB8F528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E02DA21-B25B-4626-BFDC-61AA8AF3537E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EFA39E3-A614-4A64-B29C-86D6F12F1557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B4434A4-EE82-46A1-9293-345991515369\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43CD3B48-C978-4FDB-B157-85F3E971446B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:anti-virus:2009:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6050CADE-7BAF-45B7-A031-F70558C7CE44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:anti-virus_for_the_enterprise:r8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0186ADA-0E20-4E14-B9D5-19CDFC1BD98F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:anti-virus_gateway:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD75FF0F-A36C-40AF-A99E-1596A6A6FE2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:anti-virus_plus:2009:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED8CEF9-6AEC-4771-98F7-051E4B3E0848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:arcserve_for_windows_client_agent:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5603FDAD-A347-4A44-BC45-1ADC44601D65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:arcserve_for_windows_server_component:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5086D7CF-EBAB-4E30-98E0-0D276CC1C707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:common_services:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FAD043E-3ABE-46D7-AD17-A68858692A7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:etrust_anti-virus_gateway:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C13B0E1-DCEE-46E5-81A3-C08C07C58B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:etrust_anti-virus_sdk:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"257CC950-F1BB-4D0A-9B05-98A58DB67532\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:etrust_ez_antivirus:r7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A641A2-4147-4C41-B102-18417ECA9339\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"29FEABEE-DC17-4620-B088-B24249865931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D10B864B-AA39-4702-A42B-F33BAF2D8059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DB54A16-5E56-46FC-A49C-56C98C0B8F1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:gateway_security:r8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B44F941C-83DC-4EDA-B258-C35F5EDA819E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:internet_security_suite_2008:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0281F80B-CF9C-482D-B7A9-3B2651BD0567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:internet_security_suite_plus_2008:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F7E184-EA23-487C-83ED-65CF8DD2DB18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:internet_security_suite_plus_2009:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"951062B1-C72B-4EAF-BA54-6986434036FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47C10BA4-B241-4F65-8FA1-AD88266C03B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253A8082-9AE4-4049-A1D0-B7ACB5C2E8D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:protection_suites:r3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC845898-3D77-4793-971E-5E1555ED9CDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:threat_manager:8.1:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"0115D81C-2CA2-424C-BE4B-0896C9ADA68E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:threat_manager:r8:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"A38801CD-167E-408E-89BD-52BB1B89041B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:threat_manager_total_defense:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6AEE8BC-8D0E-464F-88B7-5C2C2D372AFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:arcserve_backup:r11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8713893-59CE-486A-9262-E755A8F2D58C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/58691\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36976\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507068/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/36653\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1022999\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2852\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53697\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://osvdb.org/58691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36976\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507068/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/36653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1022999\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2852\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53697\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.