The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of CA Anti-Virus: code execution via arclib

Synthesis of the vulnerability 

An attacker can create a malformed RAR archive, which corrupts the memory, in order to stop the Anti-Virus, or to execute code.
Vulnerable systems: CA Antivirus, e-Trust Antivirus.
Severity of this threat: 3/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 09/10/2009.
Références of this weakness: BID-36653, CA20091008-01, CERTA-2009-AVI-431, CVE-2009-3587, CVE-2009-3588, G-SEC 46-2009, VIGILANCE-VUL-9080.

Description of the vulnerability 

The arclib.dll/arclib.so library extracts files contained in an archive. It is impacted by two vulnerabilities.

A malformed RAR archive generates a heap corruption in arclib. [severity:3/4; CERTA-2009-AVI-431, CVE-2009-3587]

A malformed RAR archive generates a stack corruption in arclib. [severity:3/4; CVE-2009-3588]

An attacker can therefore create a malformed RAR archive, which corrupts the memory, in order to stop the Anti-Virus, or to execute code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness impacts software or systems such as CA Antivirus, e-Trust Antivirus.

Our Vigil@nce team determined that the severity of this vulnerability announce is important.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this threat bulletin.

Solutions for this threat 

CA Anti-Virus: version for arclib.
The CA announce indicates corrected arclib versions.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerabilities alert. The technology watch team tracks security threats targeting the computer system.