Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2009-0042
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Multiple unspecified vulnerabilities in the Arclib library (arclib.dll) before 7.3.0.15 in the CA Anti-Virus engine for CA Anti-Virus for the Enterprise 7.1, r8, and r8.1; Anti-Virus 2007 v8 and 2008; Internet Security Suite 2007 v3 and 2008; and other CA products allow remote attackers to bypass virus detection via a malformed archive file..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 10/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:ca:threat_manager_for_the_enterprise:r8:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:ca:arcserve_backup:r11.5_nil_:windows:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:arcserve_backup:r11.1:_nil_:linux:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:arcserve_backup:r11.1:_nil_:windows:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:internet_security_suite_2008:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:protection_suites:r3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:arcserve_backup:r11.5_nil_:linux:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:arcserve_backup:r12.0_nil_:windows:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:internet_security_suite_2007:3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:internet_security_suite_plus_2008:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:threat_manager_for_the_enterprise:8.1:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:anti-virus:2008:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:anti-virus:2007:8:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:antivirus_gateway:7.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:anti-spyware_for_the_enterprise:8.1:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:anti-spyware:2008:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:anti-spyware:2007:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:anti-virus_sdk:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:r8:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:broadcom:anti-spyware_for_the_enterprise:r8:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8.1:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:arcserve_client_agent:-:*:windows:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:etrust_ez_antivirus:r6.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:etrust_ez_antivirus:r7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:etrust_intrusion_detection:4.0:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:broadcom:network_and_systems_management:r11:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:broadcom:network_and_systems_management:r3.0:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:network_and_systems_management:r11.1:*:*: |
Yes
|
- | - | |
cpe:2.3:a:broadcom:network_and_systems_management:r3.1:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:secure_content_manager:8.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/26/ca20090126-01-ca
- http://www.securityfocus.com/bid/33464
- http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197601
- http://www.securitytracker.com/id?1021639
- http://www.vupen.com/english/advisories/2009/0270
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48261
- http://www.securityfocus.com/archive/1/500417/100/0/threaded