{"vuid":"VU#788416","idnumber":"788416","name":"Computer Associates AntiVirus InoTask buffer overflow vulnerability","keywords":["Computer Associates","stack overflow","arbitrary code execution","file mappings","InoCore.dll","CA Anti-Virus","CA Threat Manager","CA Anti-Spyware"],"overview":"Computer Associates AntiVirus for the Enterprise and Threat Manager products contain a buffer overflow vulnerability that may be exploited by local users to execute code with elevated privileges.","clean_desc":"Computer Associates eTrust Antivirus v8 includes a component called InoTask. InoTask is used to schedule and lauch tasks and programs. The InoTask process contains a buffer overflow vulnerability. By sending malformed data to the InoTask process, a user may be able to execute code with elevated privileges. Note that publicly available exploit code exists for this vulnerability.","impact":"A local user may be able to execute code with system privileges.","resolution":"Upgrade Computer Associates has released an update to address this vulnerability. This update is available as part of the automatic content update. See Computer Associates' secnotice050807 for more details.","workarounds":"","sysaffected":"","thanks":"Thanks to iDefense for information that was used in this report. iDefense credits binagres for discovering this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["http://supportconnectw.ca.com/public/antivirus/infodocs/caav-secnotice050807.asp","http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=530","http://secunia.com/advisories/25202/","http://www.48bits.com/exploits/etrust.c"],"cveids":["CVE-2007-2523"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-05-11T13:09:46Z","publicdate":"2007-05-11T00:00:00Z","datefirstpublished":"2007-05-11T18:08:41Z","dateupdated":"2007-06-20T19:59:56Z","revision":15,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"14","cam_exploitation":"3","cam_internetinfrastructure":"5","cam_population":"7","cam_impact":"4","cam_easeofexploitation":"5","cam_attackeraccessrequired":"5","cam_scorecurrent":"0.28875","cam_scorecurrentwidelyknown":"0.3675","cam_scorecurrentwidelyknownexploited":"0.590625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.28875,"vulnote":null}