First published: Fri May 11 2007(Updated: )
Stack-based buffer overflow in the inoweb Console Server in CA Anti-Virus for the Enterprise r8, Threat Manager r8, Anti-Spyware for the Enterprise r8, and Protection Suites r3 allows remote attackers to execute arbitrary code via a long (1) username or (2) password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Anti-Spyware for the Enterprise | =8.0 | |
Broadcom CA Threat Manager | =8.0 | |
Broadcom eTrust PestPatrol | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2522 has been classified with a high severity level due to its potential to allow remote code execution.
To remediate CVE-2007-2522, update your CA Anti-Virus software to the latest version that addresses this vulnerability.
CVE-2007-2522 affects multiple Broadcom CA software products, including Anti-Virus for the Enterprise r8, Threat Manager r8, and Anti-Spyware for the Enterprise r8.
Yes, CVE-2007-2522 can be exploited remotely by attackers using a maliciously crafted long username or password.
CVE-2007-2522 is a stack-based buffer overflow vulnerability.