Show plain JSON{"id": "CVE-2007-3875", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-07-26T00:30:00.000", "references": [{"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/26155", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/474601/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/474605/100/100/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/25049", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1018450", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2007/2639", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35573", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "arclib.dll before 7.3.0.9 in CA Anti-Virus (formerly eTrust Antivirus) 8 and certain other CA products allows remote attackers to cause a denial of service (infinite loop and loss of antivirus functionality) via an invalid \"previous listing chunk number\" field in a CHM file."}, {"lang": "es", "value": "arclib.dll anterior a 7.3.0.9 en CA Anti-Virus (formalmente eTrust Antivirus) 8 y otros ciertos productos CA permiten a atacantes remotos provocar denegaci\u00f3n de servicio (bucles infinitos y perdida de funcionalidad antivirus) a trav\u00e9s de un campo\"listado previo de un trozo de n\u00famero\" en un cierto archivo CHM."}], "lastModified": "2021-04-14T15:34:35.667", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:broadcom:anti-spyware:2007:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "385B8B52-F5EA-4E13-A7EE-C2D1B694C785"}, {"criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCCEAF14-75C0-4B4E-BACB-B84D69A276BA", "versionEndIncluding": "8"}, {"criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACA94302-1501-4744-8296-6A6CD763DC6E"}, {"criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "607CCBDA-7288-4496-A7ED-EF6DED40CA21"}, {"criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6B76576-ABB1-439E-80B0-0B5AAE14BA45"}, {"criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE175BB8-DF9B-4DA0-AD2F-885CC13BB812"}, {"criteria": "cpe:2.3:a:broadcom:anti_virus_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C02D3C8C-D739-4538-8660-1ED99FFE673F"}, {"criteria": "cpe:2.3:a:broadcom:antispyware_for_the_enterprise:8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4545DACA-EFD3-4764-897B-844C010B49E3"}, {"criteria": "cpe:2.3:a:broadcom:antispyware_for_the_enterprise:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "877B83A0-A399-4B1A-9324-481DF04A104C"}, {"criteria": "cpe:2.3:a:broadcom:antivirus_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B1A8FDA-3780-440A-BDAB-3BE11BF76951"}, {"criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F52790F8-0D23-47F4-B7F7-6CB0F7B6EA14"}, {"criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E37161BE-6AF5-40E0-BD63-2C17431D8B36"}, {"criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "477EE032-D183-478F-A2BF-6165277A7414"}, {"criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_client:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D546DEE1-E8A0-4321-AE5E-1DEEE719FC06"}, {"criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78AA54EA-DAF1-4635-AA1B-E2E49C4BB597"}, {"criteria": "cpe:2.3:a:broadcom:brigthstor_arcserve_client_for_windows:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "672B430D-3BE7-4BA0-A0A6-7ABED96DE892"}, {"criteria": "cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E2FA702-184A-44FF-8DEA-7811804EE175"}, {"criteria": "cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D301B65D-A20B-4991-A0D8-DFE3363F162B"}, {"criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05185A74-8484-419D-A3CE-8603928AF0DD"}, {"criteria": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DD2FE1C-8894-41EC-B686-932F0ACC41C6"}, {"criteria": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7D938FC-E8E6-4709-BF6D-EF4833AF7D7A"}, {"criteria": "cpe:2.3:a:broadcom:etrust_ez_antivirus:7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "463CBA1F-89DC-4D24-8F27-276406D423ED"}, {"criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "330B61D3-302D-46A7-92F2-DF68B0BBB1B5"}, {"criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76D8B409-194E-4588-AE69-6E42090C443C"}, {"criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A1FDED6-7616-4F92-B660-47BE99EAD4E3"}, {"criteria": "cpe:2.3:a:broadcom:etrust_internet_security_suite:1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1CC5201-F780-42BD-B859-163E79E65FE7"}, {"criteria": "cpe:2.3:a:broadcom:etrust_internet_security_suite:2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5EF0113-DBFB-41F8-AE3F-B4B8C77ED159"}, {"criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C00221F9-33EE-4221-A5B3-A1AE42A7B9D4"}, {"criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DDF2EE3-753B-4C7E-84EF-144FA5986A21"}, {"criteria": "cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "285013A5-E058-4B2B-B8B6-1BFF72388589"}, {"criteria": "cpe:2.3:a:broadcom:secure_content_manager:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DADD1E6-3454-4C1E-AD46-82D79CB8F528"}, {"criteria": "cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E02DA21-B25B-4626-BFDC-61AA8AF3537E"}, {"criteria": "cpe:2.3:a:broadcom:threat_manager:8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE8EE8B0-CAA6-46CB-8A8E-66F3FD49FEE4"}, {"criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699"}, {"criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557"}, {"criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B4434A4-EE82-46A1-9293-345991515369"}, {"criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43CD3B48-C978-4FDB-B157-85F3E971446B"}, {"criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E236148-4A57-4FDC-A072-A77D3DD2DB53"}, {"criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D10B864B-AA39-4702-A42B-F33BAF2D8059"}, {"criteria": "cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47C10BA4-B241-4F65-8FA1-AD88266C03B0"}, {"criteria": "cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "253A8082-9AE4-4049-A1D0-B7ACB5C2E8D3"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}