CA eTrust Antivirus WebScan ActiveX Control Vulnerabilities

This script is Copyright (C) 2006-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by
multiple vulnerabilities.

Description :

The Windows remote host contains the WebScan ActiveX control, which is
used by Computer Associates' eTrust Antivirus WebScan service.

The version of this ActiveX control on the remote host reportedly
contains a buffer overflow and fails to properly validate parameters.
Exploitation of these issues may allow an unauthenticated, remote
attacker to execute arbitrary code or gain privileged access.

See also :

http://www.securityfocus.com/archive/1/442476/30/0/threaded
http://www.tippingpoint.com/security/advisories/TSRT-06-05.html
http://seclists.org/fulldisclosure/2006/Aug/188
http://securitytracker.com/id?1016637

Solution :

Either remote the control or upgrade to WebScan v1.1.0.1048 or later
by visiting http://www3.ca.com/securityadvisor/virusinfo/scan.aspx and
allowing Internet Explorer to update a new version of webscan.cab.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:ND)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 22160 (etrust_webscan_activex_overflow.nasl)

Bugtraq ID: 19399
19403

CVE ID: CVE-2006-3976
CVE-2006-3977

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now