|
|
| |
Credit:
The information has been provided by Andrea Micalizzi.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-066/
|
| |
Vulnerable Systems:
* Computer Associates XOsoft High Availability
* Computer Associates XOsoft Replication
Authentication is not required to exploit this vulnerability.
The specific flaw exists within the /entry_point.aspx service and occurs due to an unbounded string copy utilizing a string controlled by the user as the source into a fixed length buffer located on the stack. Successful exploitation can lead to code execution under the context of the service.
Patch Availability:
Computer Associates has issued an update to correct this vulnerability. More details can be found at:
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=232869
CVE Information:
CVE-2010-1223
Disclosure Timeline:
2009-12-16 - Vulnerability reported to vendor
2010-04-06 - Coordinated public release of advisory
|
|
|