CVE-2010-1223
CA XOsoft Control Service entry_point.aspx Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple buffer overflows in CA XOsoft r12.0 and r12.5 allow remote attackers to execute arbitrary code via (1) a malformed request to the ws_man/xosoapapi.asmx SOAP endpoint or (2) a long string to the entry_point.aspx service.
Múltiples desbordamiento de búfer en CA XOsoft r12.0 y r12.5, permite a atacantes remotos ejecutar código de su elección a través de (1) un petición mal formada al final de ws_man/xosoapapi.asmx SOAP o (2) una cadena larga al servicio entry_point.aspx.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Computer Associates XOsoft Control Replication and High Availability Control Service. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the /entry_point.aspx service and occurs due to an unbounded string copy utilizing a string controlled by the user as the source into a fixed length buffer located on the stack. Successful exploitation can lead to code execution under the context of the service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-04-01 CVE Reserved
- 2010-04-06 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/archive/1/510564/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/510565/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/510567/100/0/threaded | Mailing List | |
http://www.zerodayinitiative.com/advisories/ZDI-10-065 | X_refsource_misc |
|
http://www.zerodayinitiative.com/advisories/ZDI-10-066 | X_refsource_misc |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/39238 | 2018-10-10 | |
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=232869 | 2018-10-10 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ca Search vendor "Ca" | Xosoft Content Distribution Search vendor "Ca" for product "Xosoft Content Distribution" | r12.0 Search vendor "Ca" for product "Xosoft Content Distribution" and version "r12.0" | - |
Affected
| ||||||
Ca Search vendor "Ca" | Xosoft Content Distribution Search vendor "Ca" for product "Xosoft Content Distribution" | r12.5 Search vendor "Ca" for product "Xosoft Content Distribution" and version "r12.5" | - |
Affected
| ||||||
Ca Search vendor "Ca" | Xosoft High Availability Search vendor "Ca" for product "Xosoft High Availability" | r12.0 Search vendor "Ca" for product "Xosoft High Availability" and version "r12.0" | - |
Affected
| ||||||
Ca Search vendor "Ca" | Xosoft High Availability Search vendor "Ca" for product "Xosoft High Availability" | r12.5 Search vendor "Ca" for product "Xosoft High Availability" and version "r12.5" | - |
Affected
| ||||||
Ca Search vendor "Ca" | Xosoft Replication Search vendor "Ca" for product "Xosoft Replication" | r12.0 Search vendor "Ca" for product "Xosoft Replication" and version "r12.0" | - |
Affected
| ||||||
Ca Search vendor "Ca" | Xosoft Replication Search vendor "Ca" for product "Xosoft Replication" | r12.5 Search vendor "Ca" for product "Xosoft Replication" and version "r12.5" | - |
Affected
|