CVE-2007-2864 (CNNVD-200706-098)

CRITICAL 有利用代码
中文标题:
CA CAB文件头解析远程栈溢出漏洞
英文标题:
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (form...
CVSS分数: 9.3
发布时间: 2007-06-06 21:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v4
漏洞描述
中文描述:

Computer Associates是世界领先的安全厂商,产品包括多种杀毒软件及备份恢复系统。 多个CA产品的杀毒引擎在解析包含畸形字段的.CAB文档时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞控制系统。 如果.CAB文档中包含有超长coffFiles字段的话,就可能在解析此文档时触发这个溢出,导致执行任意指令。

英文描述:

Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.

CWE类型:
(暂无数据)
标签:
local windows Metasploit OSVDB-35245
受影响产品
厂商 产品 版本 版本范围 平台 CPE
broadcom anti-virus_for_the_enterprise 8 - - cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8:*:*:*:*:*:*:*
broadcom brightstor_arcserve_backup 9.01 - - cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*
broadcom brightstor_arcserve_backup 10.5 - - cpe:2.3:a:broadcom:brightstor_arcserve_backup:10.5:*:*:*:*:*:*:*
broadcom brightstor_arcserve_backup 11 - - cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*
broadcom brightstor_arcserve_backup 11.1 - - cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*
broadcom brightstor_arcserve_backup 11.5 - - cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*
broadcom common_services 1.0 - - cpe:2.3:a:broadcom:common_services:1.0:*:*:*:*:*:*:*
broadcom common_services 1.1 - - cpe:2.3:a:broadcom:common_services:1.1:*:*:*:*:*:*:*
broadcom common_services 2.0 - - cpe:2.3:a:broadcom:common_services:2.0:*:*:*:*:*:*:*
broadcom common_services 2.1 - - cpe:2.3:a:broadcom:common_services:2.1:*:*:*:*:*:*:*
broadcom common_services 2.2 - - cpe:2.3:a:broadcom:common_services:2.2:*:*:*:*:*:*:*
broadcom common_services 3.0 - - cpe:2.3:a:broadcom:common_services:3.0:*:*:*:*:*:*:*
broadcom etrust_antivirus 8.0 - - cpe:2.3:a:broadcom:etrust_antivirus:8.0:*:*:*:*:*:*:*
broadcom etrust_antivirus 8.1 - - cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*
broadcom etrust_antivirus_gateway 7.1 - - cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*
broadcom etrust_antivirus_sdk * - - cpe:2.3:a:broadcom:etrust_antivirus_sdk:*:*:*:*:*:*:*:*
broadcom etrust_ez_antivirus 6.1 - - cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*
broadcom etrust_ez_antivirus 7.0 - - cpe:2.3:a:broadcom:etrust_ez_antivirus:7.0:*:*:*:*:*:*:*
broadcom etrust_ez_armor 1.0 - - cpe:2.3:a:broadcom:etrust_ez_armor:1.0:*:*:*:*:*:*:*
broadcom etrust_ez_armor 2.0 - - cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*
broadcom etrust_ez_armor 3.0 - - cpe:2.3:a:broadcom:etrust_ez_armor:3.0:*:*:*:*:*:*:*
broadcom etrust_ez_armor 3.1 - - cpe:2.3:a:broadcom:etrust_ez_armor:3.1:*:*:*:*:*:*:*
broadcom integrated_threat_management 8.0 - - cpe:2.3:a:broadcom:integrated_threat_management:8.0:*:*:*:*:*:*:*
broadcom internet_security_suite 1.0 - - cpe:2.3:a:broadcom:internet_security_suite:1.0:*:*:*:*:*:*:*
broadcom internet_security_suite 2.0 - - cpe:2.3:a:broadcom:internet_security_suite:2.0:*:*:*:*:*:*:*
broadcom internet_security_suite 3.0 - - cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*
broadcom unicenter_network_and_systems_management 3.0 - - cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*
broadcom unicenter_network_and_systems_management 3.1 - - cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*
broadcom unicenter_network_and_systems_management 11 - - cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*
broadcom unicenter_network_and_systems_management 11.1 - - cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*
ca etrust_secure_content_manager 8.0 - - cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*
ca protection_suites r2 - - cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*
ca protection_suites r3 - - cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
24330 vdb-entry
cve.org
访问
20070605 ZDI-07-035: CA Multiple Product AV Engine CAB Header Parsing Stack Overflow Vulnerability mailing-list
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
VU#105105 third-party-advisory
cve.org
访问
ADV-2007-2072 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
20070607 [CAID 35395, 35396]: CA Anti-Virus Engine CAB File Buffer Overflow Vulnerabilities mailing-list
cve.org
访问
ca-multiple-antivirus-cofffiles-bo(34737) vdb-entry
cve.org
访问
1018199 vdb-entry
cve.org
访问
35245 vdb-entry
cve.org
访问
25570 third-party-advisory
cve.org
访问
ExploitDB EDB-16677 EXPLOIT
exploitdb
访问
Download Exploit EDB-16677 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2007-2864 ADVISORY
cve.org
访问
CVSS评分详情
9.3
CRITICAL
CVSS向量: AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2007-06-06 21:00:00
修改时间:
2024-08-07 13:57:54
创建时间:
2025-11-11 15:32:44
更新时间:
2026-01-26 02:16:29
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2007-2864 2025-11-11 15:17:53 2025-11-11 07:32:44
NVD nvd_CVE-2007-2864 2025-11-11 14:52:11 2025-11-11 07:41:30
CNNVD cnnvd_CNNVD-200706-098 2025-11-11 15:08:57 2025-11-11 07:49:18
EXPLOITDB exploitdb_EDB-16677 2025-11-11 15:05:52 2025-11-11 08:11:08
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:11:08
references_count: 11 → 14; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 11 -> 14
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:18
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-200706-098; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-200706-098
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:30
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 33; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 9.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 33
  • data_sources: ['cve'] -> ['cve', 'nvd']