CVE-2005-1693
Published May 24, 2005
Last updated 4 years ago
Overview
- Description
- Integer overflow in Computer Associates Vet Antivirus library, as used by CA InoculateIT 6.0, eTrust Antivirus r6.0 through 7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, BrightStor ARCserve Backup (BAB) r11.1, Vet Antivirus, Zonelabs ZoneAlarm Security Suite, and ZoneAlarm Antivirus, allows remote attackers to gain privileges via a compressed VBA directory with a project name length of -1, which leads to a heap-based buffer overflow.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7E6F7CD-745B-40A3-97E1-7F2127F257D9" }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB32FD77-F67F-4D62-B9F1-46F4569ACBEC" }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A08C715-A351-466D-99EC-006C106A3366" }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus_ee:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E22BC0B-8EDE-42A8-83C8-042527239671" }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus_ee:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D8E9674-8578-4757-AC1E-F91A226A43FD" }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "714BCFBA-B843-4C14-AA78-F7CF17899D28" }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C61D9546-7619-465B-B3CA-C60218CD574B" }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95B192C7-1FC3-4D18-A17F-E3414BF56713" }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "217ED722-3ECD-47B5-8AB3-E1789675D1C1" }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E9E5743-8B07-481A-B647-744DA615F779" }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor_le:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74FE5C87-46B1-471F-A187-45399A00DBF8" }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor_le:3.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DD6F73B-C8C0-47DE-BDC5-243712892AE4" }, { "criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "511E44CE-86E6-4777-9AEC-9C9A5DA2FAAB" }, { "criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B65AC50D-032F-4D8E-AC46-6AD69AC4B16F" }, { "criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18F12F09-BFCC-430B-BDC0-38643E90C10A" }, { "criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DDF2EE3-753B-4C7E-84EF-144FA5986A21" }, { "criteria": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F9F9A7A-CC5E-42FD-87F7-4E7473A903D2" }, { "criteria": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69184A5E-4FA9-4896-B6E8-1B9D4D62D099" }, { "criteria": "cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CAE9329-AA34-4F56-B4BE-B028F021173B" }, { "criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup:11.1:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E11A387-BF4A-4A54-8F29-37EFF14D72DD" }, { "criteria": "cpe:2.3:a:ca:etrust_antivirus:7.0:*:gateway:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B138DD19-1453-4167-A88A-EC861E4BBAA9" }, { "criteria": "cpe:2.3:a:ca:etrust_antivirus:7.0_sp2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37BDDF08-C3D9-4714-91CB-F865BBF9FCE7" }, { "criteria": "cpe:2.3:a:ca:etrust_antivirus:7.1:*:gateway:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A36A178-36EB-4A90-AC52-B98C2DE20011" }, { "criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D10B864B-AA39-4702-A42B-F33BAF2D8059" }, { "criteria": "cpe:2.3:a:ca:etrust_secure_content_manager:1.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5005F6FB-8808-4FA0-9EFF-F50A94419E2A" }, { "criteria": "cpe:2.3:a:ca:vet_antivirus:10.66:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D5CB7EE-225A-4356-BDAF-F7F41BD7C150" }, { "criteria": "cpe:2.3:a:zonelabs:zonealarm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15B8B67A-6F75-4176-A6A5-E2F695F52C5F" }, { "criteria": "cpe:2.3:a:zonelabs:zonealarm_antivirus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC159EA2-7A06-4C5B-85D7-00EE6ABE8033" } ], "operator": "OR" } ] } ]