|
|
|
|
| |
Credit:
The information has been provided by Andrea Micalizzi.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-11-237/
|
| |
Vulnerable Systems:
* CA Total Defense Suite
Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Icihttp.exe module (CA Gateway Security for HTTP), which responds to incoming HTTP requests on port 8080. Due to a flawed copy-loop algorithm in the URL parsing routine, it is possible for a remote unauthenticated user to cause an exploitable heap corruption condition. This could result in the execution of arbitrary code under the context of the Gateway Security service.
Patch Availability:
CA20110720-01: Security Notice and solution for CA Gateway Security and Total Defense
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7b5E404992-6B58-4C44-A29D-027D05B6285D%7d
CVE Information:
CVE-2011-2667
Disclosure Timeline:
2011-01-21 - Vulnerability reported to vendor
2011-07-20 - Coordinated public release of advisory
|
|
|
|
|