6 results (0.013 seconds)

CVSS: 10.0EPSS: 21%CPEs: 2EXPL: 0

Icihttp.exe in CA Gateway Security for HTTP, as used in CA Gateway Security 8.1 before 8.1.0.69 and CA Total Defense r12, does not properly parse URLs, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and daemon crash) via a malformed request. Icihttp.exe en CA Gateway Security para HTTP, como se usa en CA Gateway Security v8.1 antes de v8.1.0.69 y CA Total Defense r12, no analiza correctamente las direcciones URL, lo que permite a atacantes remotos ejecutar código de su elección o causar una denegación de servicio (corrupción de memoria dinámica y caída del demonio) a través de una solicitud mal formada. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CA Total Defense Suite r12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Icihttp.exe module (CA Gateway Security for HTTP), which responds to incoming HTTP requests on port 8080. Due to a flawed copy-loop algorithm in the URL parsing routine, it is possible for a remote unauthenticated user to cause an exploitable heap corruption condition. • http://secunia.com/advisories/45332 http://securityreason.com/securityalert/8316 http://securitytracker.com/id?1025812 http://securitytracker.com/id?1025813 http://www.securityfocus.com/archive/1/518934/100/0/threaded http://www.securityfocus.com/archive/1/518935/100/0/threaded http://www.securityfocus.com/bid/48813 http://www.zerodayinitiative.com/advisories/ZDI-11-237 https://exchange.xforce.ibmcloud.com/vulnerabilities/68736 https://support.ca.com/irj/portal/anonymous/phpsupcontent?conten • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 1

Multiple SQL injection vulnerabilities in the Unified Network Control (UNC) Server in CA Total Defense (TD) r12 before SE2 allow remote attackers to execute arbitrary SQL commands via vectors involving the (1) UnAssignFunctionalRoles, (2) UnassignAdminRoles, (3) DeleteFilter, (4) NonAssignedUserList, (5) DeleteReportLayout, (6) DeleteReports, and (7) RegenerateReport stored procedures. Múltiples vulnerabilidades de inyección SQL en Unified Network Control (UNC) Server en CA Total Defense (TD) r12 antes de SE2, permite a atacantes remotos ejecutar comandos SQL de su elección a través de los procedimientos almacenados(1)UnAssignFunctionalRoles (2) UnassignAdminRoles, (3) DeleteFilter, (4) NonAssignedUserList, (5) DeleteReportLayout, (6) DeleteReports, y(7) RegenerateReport . This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CA Total Defense Suite r12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RegenerateReport stored procedure, accessed via the management.asmx console. The Management Web Service listens for SOAP 1.2 requests on port 34444 for HTTP and 34443 for HTTPS. • https://www.exploit-db.com/exploits/17922 http://secunia.com/advisories/44097 http://securityreason.com/securityalert/8403 http://securitytracker.com/id?1025353 http://www.securityfocus.com/archive/1/517489/100/0/threaded http://www.securityfocus.com/archive/1/517490/100/0/threaded http://www.securityfocus.com/archive/1/517491/100/0/threaded http://www.securityfocus.com/archive/1/517493/100/0/threaded http://www.securityfocus.com/archive/1/517494/100/0/threaded http:/ • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 10%CPEs: 1EXPL: 0

Directory traversal vulnerability in the Heartbeat Web Service in CA.Itm.Server.ManagementWS.dll in the Management Server in CA Total Defense (TD) r12 before SE2 allows remote attackers to execute arbitrary code via directory traversal sequences in the GUID parameter in an upload request to FileUploadHandler.ashx. Vulnerabilidad de salto de directorio en Heartbeat Web Service de CA.Itm.Server.ManagementWS.dll en Management Server de CA Total Defense (TD) r12 antes de SE2, permite a atacantes remotos ejecutar código arbitrario a través de secuencias de salto de directorio en el parámetro GUID en una solicitud de carga a FileUploadHandler.ashx. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CA Total Defense Endpoint. Authentication is not required to exploit this vulnerability. The specific flaw exists within CA.Itm.Server.ManagementWS.dll. Due to a failure to properly sanitize user-controlled input, it is possible for a remote unauthenticated attacker to upload and subsequently execute arbitrary code under the context of the CA Total Defense Heartbeat Web service. • http://secunia.com/advisories/44097 http://securitytracker.com/id?1025353 http://www.securityfocus.com/archive/1/517488/100/0/threaded http://www.securityfocus.com/archive/1/517494/100/0/threaded http://www.securityfocus.com/bid/47357 http://www.vupen.com/english/advisories/2011/0977 http://www.zerodayinitiative.com/advisories/ZDI-11-126 https://exchange.xforce.ibmcloud.com/vulnerabilities/66726 https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BCD065CEC-AFE2-4D9D-8E0B • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 0

The management.asmx module in the Management Web Service in the Unified Network Control (UNC) Server in CA Total Defense (TD) r12 before SE2 sends a cleartext response to unspecified getDBConfigSettings requests, which makes it easier for remote attackers to obtain database credentials, and subsequently execute arbitrary code, by sniffing the network, related to the UNCWS Web Service. Módulo management.asmx en Management Web Service de Unified Network Control Server en CA Total Defense(TD)r12 antes de SE2 envía una respuesta en texto plano a las solicitudes getDBConfigSettings sin especificar, lo que hace que sea más fácil para los atacantes remotos obtener credenciales de base de datos, y, posteriormente, ejecutar código arbitrario, mediante escuchas en la red, relacionados con el Servicio UNCWS Web. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CA Total Defense Suite. Authentication is not required to exploit this vulnerability. The specific flaw exists within the management.asmx module of the Management Web Service. This process responds to SOAP 1.2 requests on port 34444 for HTTP and port 34443 for HTTPS. • http://secunia.com/advisories/44097 http://securitytracker.com/id?1025353 http://www.securityfocus.com/archive/1/517492/100/0/threaded http://www.securityfocus.com/archive/1/517494/100/0/threaded http://www.securityfocus.com/bid/47356 http://www.vupen.com/english/advisories/2011/0977 http://www.zerodayinitiative.com/advisories/ZDI-11-127 https://exchange.xforce.ibmcloud.com/vulnerabilities/66727 https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BCD065CEC-AFE2-4D9D-8E0B • CWE-310: Cryptographic Issues •

CVSS: 9.3EPSS: 23%CPEs: 52EXPL: 0

Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588. Vulnerabilidad no especificada en el componente arclib en el motor Anti-Virus en CA Anti-Virus para Enterprise (formalmente eTrust Antivirus) v7.1 hasta v8.1; Anti-Virus 2007 (v8) hasta 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) hasta Plus 2009; y otros productos CA permite a atacantes remotos causar una denegación de servicio y ejecutar probablemente código de su elección a través del archivo RAR manipulado que provoca una corrupción de la memoria dinámica, una vulnerabilidad diferente que CVE-2009-3588. • http://osvdb.org/58691 http://secunia.com/advisories/36976 http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878 http://www.securityfocus.com/archive/1/507068/100/0/threaded http://www.securityfocus.com/bid/36653 http://www.securitytracker.com/id?1022999 http://www.vupen.com/english/advisories/2009/2852 https://exchange.xforce.ibmcloud.com/vulnerabilities/53697 •