Product:

Etrust_antivirus

(Broadcom)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 16
Date Id Summary Products Score Patch Annotated
2006-06-27 CVE-2006-3223 Format string vulnerability in CA Integrated Threat Management (ITM), eTrust Antivirus (eAV), and eTrust PestPatrol (ePP) r8 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a scan job with format strings in the description field. Etrust_antivirus, Etrust_pestpatrol, Integrated_threat_management N/A
2005-10-30 CVE-2005-3372 Multiple interpretation error in eTrust CA 7.0.1.4 with the 11.9.1 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." Etrust_antivirus N/A
2005-10-14 CVE-2005-3225 Multiple interpretation error in unspecified versions of (1) eTrust-Iris and (2) eTrust-Vet Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. Etrust_antivirus, Etrust_antivirus_iris_engine N/A
2005-05-24 CVE-2005-1693 Integer overflow in Computer Associates Vet Antivirus library, as used by CA InoculateIT 6.0, eTrust Antivirus r6.0 through 7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, BrightStor ARCserve Backup (BAB) r11.1, Vet Antivirus, Zonelabs ZoneAlarm Security Suite, and ZoneAlarm Antivirus, allows remote attackers to gain privileges via a compressed VBA directory with a project name length of -1, which leads to a heap-based buffer overflow. Etrust_antivirus, Etrust_antivirus_ee, Etrust_ez_armor, Etrust_ez_armor_le, Etrust_intrusion_detection, Etrust_secure_content_manager, Inoculateit, Brightstor_arcserve_backup, Etrust_antivirus, Etrust_intrusion_detection, Etrust_secure_content_manager, Vet_antivirus, Zonealarm, Zonealarm_antivirus N/A
2005-01-27 CVE-2004-0933 Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Archive_zip, Brightstor_arcserve_backup, Etrust_antivirus, Etrust_antivirus_gateway, Etrust_ez_antivirus, Etrust_ez_armor, Etrust_intrusion_detection, Etrust_secure_content_manager, Inoculateit, Etrust_antivirus, Etrust_secure_content_manager, Nod32_antivirus, Linux, Kaspersky_anti\-Virus, Mandrake_linux, Antivirus_engine, Rav_antivirus_desktop, Rav_antivirus_for_file_servers, Rav_antivirus_for_mail_servers, Sophos_anti\-Virus, Sophos_puremessage_anti\-Virus, Sophos_small_business_suite, Suse_linux N/A
2005-01-27 CVE-2004-0932 McAfee Anti-Virus Engine DATS drivers before 4398 released on Oct 13th 2004 and DATS Driver before 4397 October 6th 2004 allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Archive_zip, Brightstor_arcserve_backup, Etrust_antivirus, Etrust_antivirus_gateway, Etrust_ez_antivirus, Etrust_ez_armor, Etrust_intrusion_detection, Etrust_secure_content_manager, Inoculateit, Etrust_antivirus, Etrust_secure_content_manager, Nod32_antivirus, Linux, Kaspersky_anti\-Virus, Mandrake_linux, Antivirus_engine, Rav_antivirus_desktop, Rav_antivirus_for_file_servers, Rav_antivirus_for_mail_servers, Sophos_anti\-Virus, Sophos_puremessage_anti\-Virus, Sophos_small_business_suite, Suse_linux N/A