This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Windows host has an application that is affected by a
buffer overflow vulnerability.
The version of CA Anti-Virus for the Enterprise / Threat Manager
installed on the remote host is affected by a stack-based buffer
overflow involving its task service, InoTask.exe. By supplying a long
path to the file job's path, a local attacker can overflow a buffer in
the 'QSIGetQueueID()' function in 'InoCore.dll', leading to possible
command execution with the privileges under which the task service
operates, LOCAL SYSTEM by default.
See also :
Ensure that automatic content updates are enabled for the eTrust ITM
Common component and working.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.0
Public Exploit Available : true