CERTA-2004-AVI-403
Vulnerability from certfr_avis
None
Description
Selon l'éditeur Computer Associates, les fichiers du logiciel eTrust EZ Antivirus ne sont pas installés avec des droits d'accès correctement positionnés.
Certains des programmes de l'antivirus s'exécutant avec les privilèges SYSTEM, il est alors possible pour un utilisateur local mal intentionné de modifier ces fichiers pour réaliser une élévation de privilèges.
Solution
La version r7.0.5 du logiciel corrige cette vulnérabilité.
eTrust EZ Antivirus versions r7.0.0 - r7.0.4.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eeTrust EZ Antivirus versions r7.0.0 - r7.0.4.\u003c/p\u003e",
"content": "## Description\n\nSelon l\u0027\u00e9diteur Computer Associates, les fichiers du logiciel eTrust EZ\nAntivirus ne sont pas install\u00e9s avec des droits d\u0027acc\u00e8s correctement\npositionn\u00e9s.\n\nCertains des programmes de l\u0027antivirus s\u0027ex\u00e9cutant avec les privil\u00e8ges\nSYSTEM, il est alors possible pour un utilisateur local mal intentionn\u00e9\nde modifier ces fichiers pour r\u00e9aliser une \u00e9l\u00e9vation de privil\u00e8ges.\n\n## Solution\n\nLa version r7.0.5 du logiciel corrige cette vuln\u00e9rabilit\u00e9.\n",
"cves": [],
"initial_release_date": "2004-12-17T00:00:00",
"last_revision_date": "2004-12-17T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de Computer Associates \"Vulnerability ID: 32054 - CA eTrust EZ Antivirus Insecure File Permission\" du 15 d\u00e9cembre 2004 :",
"url": "http://crm.my-etrust.com/CIDocument.asp?KDId=2222\u0026GUID=CF4848E796964617849BA923F9299C98"
}
],
"reference": "CERTA-2004-AVI-403",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-12-17T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 d\u0027eTrust Antivirus de Computer Associates",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 d\u0027iDEFENSE",
"url": "http://www.idefense.com/application/poi/display?id=164"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…