CVE-2007-2864
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/06/2007
Last modified:
09/04/2025
Description
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:brightstor_arcserve_backup:10.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:common_services:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:common_services:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:common_services:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:common_services:2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:common_services:2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:common_services:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:etrust_antivirus:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/25570
- http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp
- http://www.kb.cert.org/vuls/id/105105
- http://www.osvdb.org/35245
- http://www.securityfocus.com/archive/1/470602/100/0/threaded
- http://www.securityfocus.com/archive/1/470754/100/0/threaded
- http://www.securityfocus.com/bid/24330
- http://www.securitytracker.com/id?1018199=
- http://www.vupen.com/english/advisories/2007/2072
- http://www.zerodayinitiative.com/advisories/ZDI-07-035.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34737
- http://secunia.com/advisories/25570
- http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp
- http://www.kb.cert.org/vuls/id/105105
- http://www.osvdb.org/35245
- http://www.securityfocus.com/archive/1/470602/100/0/threaded
- http://www.securityfocus.com/archive/1/470754/100/0/threaded
- http://www.securityfocus.com/bid/24330
- http://www.securitytracker.com/id?1018199=
- http://www.vupen.com/english/advisories/2007/2072
- http://www.zerodayinitiative.com/advisories/ZDI-07-035.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34737