9.3
CVSSv2

CVE-2007-2864

Published: 06/06/2007 Updated: 14/04/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote malicious users to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

broadcom brightstor arcserve backup 10.5

broadcom brightstor arcserve backup 11

broadcom common services 2.2

broadcom common services 3.0

broadcom etrust ez armor 1.0

broadcom etrust ez armor 2.0

broadcom internet security suite 3.0

ca protection suites r2

ca protection suites r3

broadcom anti-virus for the enterprise 8

broadcom common services 2.0

broadcom common services 2.1

broadcom etrust ez antivirus 6.1

broadcom etrust ez antivirus 7.0

broadcom internet security suite 1.0

broadcom internet security suite 2.0

broadcom common services 1.0

broadcom common services 1.1

broadcom etrust antivirus gateway 7.1

broadcom etrust antivirus sdk

ca etrust secure content manager 8.0

broadcom integrated threat management 8.0

broadcom unicenter network and systems management 3.0

broadcom unicenter network and systems management 3.1

broadcom brightstor arcserve backup 11.1

broadcom brightstor arcserve backup 11.5

broadcom brightstor arcserve backup 9.01

broadcom etrust antivirus 8.0

broadcom etrust antivirus 8.1

broadcom etrust ez armor 3.0

broadcom etrust ez armor 3.1

broadcom unicenter network and systems management 11

broadcom unicenter network and systems management 11.1

Exploits

## # $Id: ca_cabrb 10998 2010-11-11 22:43:22Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasplo ...