CVE-2008-2541
CA ETrust Secure Content Manager Gateway FTP LIST Stack Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple stack-based buffer overflows in the HTTP Gateway Service (icihttp.exe) in CA eTrust Secure Content Manager 8.0 allow remote attackers to execute arbitrary code or cause a denial of service via long FTP responses, related to (1) the file month field in a LIST command; (2) the PASV command; and (3) directories, files, and links in a LIST command.
Múltiples desbordamientos de búfer en la región stack de la memoria en el Servicio de Puerta de Enlace HTTP (icihttp.exe) en CA eTrust Secure Content Manager versión 8.0, permiten a los atacantes remotos ejecutar código arbitrario o causar una denegación de servicio por medio de respuestas FTP largas, relacionadas con (1) el campo file month en un comando LIST; (2) el comando PASV; y (3) directorios, archivos y enlaces en un comando LIST.
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates eTrust Secure Content Manager. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the HTTP Gateway service icihttp.exe running on port 8080. When issuing a request for a FTP service the process tries to decorate the contents of the transaction. In this particular case by specifying a overly long response to a LIST command a stack buffer can be overflowed. Successful exploitation can lead to complete system compromise under the SYSTEM context.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-06-03 CVE Reserved
- 2008-06-04 CVE Published
- 2024-08-07 CVE Updated
- 2024-11-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://dvlabs.tippingpoint.com/advisory/TPTI-08-05 | X_refsource_misc | |
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36408 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/493082/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/493084/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/493087/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/493124/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/29528 | Vdb Entry | |
http://www.securitytracker.com/id?1020167 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-08-035 | X_refsource_misc | |
http://www.zerodayinitiative.com/advisories/ZDI-08-036 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42821 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=QO99987&os=NT&actionID=3 | 2018-10-11 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/30518 | 2018-10-11 | |
http://www.vupen.com/english/advisories/2008/1741/references | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ca Search vendor "Ca" | Etrust Secure Content Manager Search vendor "Ca" for product "Etrust Secure Content Manager" | 8.0 Search vendor "Ca" for product "Etrust Secure Content Manager" and version "8.0" | - |
Affected
|