2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-3587" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-10-13T10:30:00.610" ,
2025-04-09 02:05:49 +00:00
"lastModified" : "2025-04-09T00:30:58.490" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad no especificada en el componente arclib en el motor Anti-Virus en CA Anti-Virus para Enterprise (formalmente eTrust Antivirus) v7.1 hasta v8.1; Anti-Virus 2007 (v8) hasta 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) hasta Plus 2009; y otros productos CA permite a atacantes remotos causar una denegaci\u00f3n de servicio y ejecutar probablemente c\u00f3digo de su elecci\u00f3n a trav\u00e9s del archivo RAR manipulado que provoca una corrupci\u00f3n de la memoria din\u00e1mica, una vulnerabilidad diferente que CVE-2009-3588."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 9.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:anti-virus:2007:8:*:*:*:*:*:*" ,
"matchCriteriaId" : "C469EBBE-EE96-4CED-BD8C-36461750C6A2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:anti-virus:2008:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C5E892B-0EE8-4B76-97B8-0BAF17E83F49"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "607CCBDA-7288-4496-A7ED-EF6DED40CA21"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:r8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "11BCD267-E8CE-4A97-B769-5F4CAF9830D8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:anti-virus_sdk:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "865B7BD2-3AD1-41CA-842B-47BC4F1426DB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0E2FA702-184A-44FF-8DEA-7811804EE175"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D301B65D-A20B-4991-A0D8-DFE3363F162B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A08C715-A351-466D-99EC-006C106A3366"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:etrust_antivirus:8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "05185A74-8484-419D-A3CE-8603928AF0DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "52C533CA-ACB7-4C0F-98E2-B5E51E24A554"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:etrust_integrated_threat_management:8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8FD8D5F0-9606-4BBA-B7F9-ACD089B84DC2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3DDF2EE3-753B-4C7E-84EF-144FA5986A21"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "69184A5E-4FA9-4896-B6E8-1B9D4D62D099"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:internet_security_suite:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F30C4FF9-DB76-4B3F-9582-752097B3D521"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "285013A5-E058-4B2B-B8B6-1BFF72388589"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:network_and_systems_management:r3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0FF55705-42ED-4503-8534-FDEA365E84E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:network_and_systems_management:r3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB548763-E1A7-4DB1-BE86-ED5AA1CA81BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:network_and_systems_management:r11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B28429A-F343-4BE8-A94D-5A5AC3F6258C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:network_and_systems_management:r11.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFF64064-1C35-4888-BBC2-52F68EF9517F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:secure_content_manager:1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4DADD1E6-3454-4C1E-AD46-82D79CB8F528"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5E02DA21-B25B-4626-BFDC-61AA8AF3537E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2EFA39E3-A614-4A64-B29C-86D6F12F1557"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B4434A4-EE82-46A1-9293-345991515369"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "43CD3B48-C978-4FDB-B157-85F3E971446B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:anti-virus:2009:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6050CADE-7BAF-45B7-A031-F70558C7CE44"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:anti-virus_for_the_enterprise:r8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0186ADA-0E20-4E14-B9D5-19CDFC1BD98F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:anti-virus_gateway:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FD75FF0F-A36C-40AF-A99E-1596A6A6FE2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:anti-virus_plus:2009:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BED8CEF9-6AEC-4771-98F7-051E4B3E0848"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:arcserve_for_windows_client_agent:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5603FDAD-A347-4A44-BC45-1ADC44601D65"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:arcserve_for_windows_server_component:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5086D7CF-EBAB-4E30-98E0-0D276CC1C707"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:common_services:3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7FAD043E-3ABE-46D7-AD17-A68858692A7E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:etrust_anti-virus_gateway:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4C13B0E1-DCEE-46E5-81A3-C08C07C58B9A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:etrust_anti-virus_sdk:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "257CC950-F1BB-4D0A-9B05-98A58DB67532"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:etrust_ez_antivirus:r7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A0A641A2-4147-4C41-B102-18417ECA9339"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "29FEABEE-DC17-4620-B088-B24249865931"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "D10B864B-AA39-4702-A42B-F33BAF2D8059"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5DB54A16-5E56-46FC-A49C-56C98C0B8F1A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:gateway_security:r8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B44F941C-83DC-4EDA-B258-C35F5EDA819E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:internet_security_suite_2008:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0281F80B-CF9C-482D-B7A9-3B2651BD0567"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:internet_security_suite_plus_2008:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33F7E184-EA23-487C-83ED-65CF8DD2DB18"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:internet_security_suite_plus_2009:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "951062B1-C72B-4EAF-BA54-6986434036FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47C10BA4-B241-4F65-8FA1-AD88266C03B0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "253A8082-9AE4-4049-A1D0-B7ACB5C2E8D3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:protection_suites:r3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC845898-3D77-4793-971E-5E1555ED9CDA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:threat_manager:8.1:*:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "0115D81C-2CA2-424C-BE4B-0896C9ADA68E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:threat_manager:r8:*:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "A38801CD-167E-408E-89BD-52BB1B89041B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:threat_manager_total_defense:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6AEE8BC-8D0E-464F-88B7-5C2C2D372AFA"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:arcserve_backup:r11.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8713893-59CE-486A-9262-E755A8F2D58C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
2024-05-17 18:03:22 +00:00
"criteria" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
2023-04-24 12:24:31 +02:00
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://osvdb.org/58691" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/36976" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/507068/100/0/threaded" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/36653" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id?1022999" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/2852" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://osvdb.org/58691" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/36976" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/507068/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/36653" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id?1022999" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/2852" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
}
]
}