CVE-2007-2864 (CNNVD-200706-098)
CRITICAL
有利用代码
中文标题:
CA CAB文件头解析远程栈溢出漏洞
英文标题:
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (form...
CVSS分数:
9.3
发布时间:
2007-06-06 21:00:00
漏洞类型:
其他
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v4
漏洞描述
中文描述:
Computer Associates是世界领先的安全厂商,产品包括多种杀毒软件及备份恢复系统。 多个CA产品的杀毒引擎在解析包含畸形字段的.CAB文档时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞控制系统。 如果.CAB文档中包含有超长coffFiles字段的话,就可能在解析此文档时触发这个溢出,导致执行任意指令。
英文描述:
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.
CWE类型:
(暂无数据)
标签:
local
windows
Metasploit
OSVDB-35245
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| broadcom | anti-virus_for_the_enterprise | 8 | - | - |
cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8:*:*:*:*:*:*:*
|
| broadcom | brightstor_arcserve_backup | 9.01 | - | - |
cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*
|
| broadcom | brightstor_arcserve_backup | 10.5 | - | - |
cpe:2.3:a:broadcom:brightstor_arcserve_backup:10.5:*:*:*:*:*:*:*
|
| broadcom | brightstor_arcserve_backup | 11 | - | - |
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*
|
| broadcom | brightstor_arcserve_backup | 11.1 | - | - |
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*
|
| broadcom | brightstor_arcserve_backup | 11.5 | - | - |
cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*
|
| broadcom | common_services | 1.0 | - | - |
cpe:2.3:a:broadcom:common_services:1.0:*:*:*:*:*:*:*
|
| broadcom | common_services | 1.1 | - | - |
cpe:2.3:a:broadcom:common_services:1.1:*:*:*:*:*:*:*
|
| broadcom | common_services | 2.0 | - | - |
cpe:2.3:a:broadcom:common_services:2.0:*:*:*:*:*:*:*
|
| broadcom | common_services | 2.1 | - | - |
cpe:2.3:a:broadcom:common_services:2.1:*:*:*:*:*:*:*
|
| broadcom | common_services | 2.2 | - | - |
cpe:2.3:a:broadcom:common_services:2.2:*:*:*:*:*:*:*
|
| broadcom | common_services | 3.0 | - | - |
cpe:2.3:a:broadcom:common_services:3.0:*:*:*:*:*:*:*
|
| broadcom | etrust_antivirus | 8.0 | - | - |
cpe:2.3:a:broadcom:etrust_antivirus:8.0:*:*:*:*:*:*:*
|
| broadcom | etrust_antivirus | 8.1 | - | - |
cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*
|
| broadcom | etrust_antivirus_gateway | 7.1 | - | - |
cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*
|
| broadcom | etrust_antivirus_sdk | * | - | - |
cpe:2.3:a:broadcom:etrust_antivirus_sdk:*:*:*:*:*:*:*:*
|
| broadcom | etrust_ez_antivirus | 6.1 | - | - |
cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*
|
| broadcom | etrust_ez_antivirus | 7.0 | - | - |
cpe:2.3:a:broadcom:etrust_ez_antivirus:7.0:*:*:*:*:*:*:*
|
| broadcom | etrust_ez_armor | 1.0 | - | - |
cpe:2.3:a:broadcom:etrust_ez_armor:1.0:*:*:*:*:*:*:*
|
| broadcom | etrust_ez_armor | 2.0 | - | - |
cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*
|
| broadcom | etrust_ez_armor | 3.0 | - | - |
cpe:2.3:a:broadcom:etrust_ez_armor:3.0:*:*:*:*:*:*:*
|
| broadcom | etrust_ez_armor | 3.1 | - | - |
cpe:2.3:a:broadcom:etrust_ez_armor:3.1:*:*:*:*:*:*:*
|
| broadcom | integrated_threat_management | 8.0 | - | - |
cpe:2.3:a:broadcom:integrated_threat_management:8.0:*:*:*:*:*:*:*
|
| broadcom | internet_security_suite | 1.0 | - | - |
cpe:2.3:a:broadcom:internet_security_suite:1.0:*:*:*:*:*:*:*
|
| broadcom | internet_security_suite | 2.0 | - | - |
cpe:2.3:a:broadcom:internet_security_suite:2.0:*:*:*:*:*:*:*
|
| broadcom | internet_security_suite | 3.0 | - | - |
cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*
|
| broadcom | unicenter_network_and_systems_management | 3.0 | - | - |
cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*
|
| broadcom | unicenter_network_and_systems_management | 3.1 | - | - |
cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*
|
| broadcom | unicenter_network_and_systems_management | 11 | - | - |
cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*
|
| broadcom | unicenter_network_and_systems_management | 11.1 | - | - |
cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*
|
| ca | etrust_secure_content_manager | 8.0 | - | - |
cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*
|
| ca | protection_suites | r2 | - | - |
cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*
|
| ca | protection_suites | r3 | - | - |
cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
24330
vdb-entry
cve.org
访问
cve.org
20070605 ZDI-07-035: CA Multiple Product AV Engine CAB Header Parsing Stack Overflow Vulnerability
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
VU#105105
third-party-advisory
cve.org
访问
cve.org
ADV-2007-2072
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
20070607 [CAID 35395, 35396]: CA Anti-Virus Engine CAB File Buffer Overflow Vulnerabilities
mailing-list
cve.org
访问
cve.org
ca-multiple-antivirus-cofffiles-bo(34737)
vdb-entry
cve.org
访问
cve.org
1018199
vdb-entry
cve.org
访问
cve.org
35245
vdb-entry
cve.org
访问
cve.org
25570
third-party-advisory
cve.org
访问
cve.org
ExploitDB EDB-16677
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-16677
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2007-2864
ADVISORY
cve.org
访问
cve.org
CVSS评分详情
9.3
CRITICAL
CVSS向量:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS版本:
2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2007-06-06 21:00:00
修改时间:
2024-08-07 13:57:54
创建时间:
2025-11-11 15:32:44
更新时间:
2026-01-26 02:16:29
利用信息
此漏洞有可利用代码!
利用代码数量:
1
利用来源:
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2007-2864 |
2025-11-11 15:17:53 | 2025-11-11 07:32:44 |
| NVD | nvd_CVE-2007-2864 |
2025-11-11 14:52:11 | 2025-11-11 07:41:30 |
| CNNVD | cnnvd_CNNVD-200706-098 |
2025-11-11 15:08:57 | 2025-11-11 07:49:18 |
| EXPLOITDB | exploitdb_EDB-16677 |
2025-11-11 15:05:52 | 2025-11-11 08:11:08 |
版本与语言
当前版本:
v4
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4
EXPLOITDB
2025-11-11 16:11:08
references_count: 11 → 14; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 11 -> 14
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:49:18
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-200706-098; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-200706-098
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:30
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 33; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 9.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 33
- data_sources: ['cve'] -> ['cve', 'nvd']