// For flags

CVE-2010-1223

CA XOsoft Control Service entry_point.aspx Remote Code Execution Vulnerability

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple buffer overflows in CA XOsoft r12.0 and r12.5 allow remote attackers to execute arbitrary code via (1) a malformed request to the ws_man/xosoapapi.asmx SOAP endpoint or (2) a long string to the entry_point.aspx service.

Múltiples desbordamiento de búfer en CA XOsoft r12.0 y r12.5, permite a atacantes remotos ejecutar código de su elección a través de (1) un petición mal formada al final de ws_man/xosoapapi.asmx SOAP o (2) una cadena larga al servicio entry_point.aspx.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Computer Associates XOsoft Control Replication and High Availability Control Service. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the /entry_point.aspx service and occurs due to an unbounded string copy utilizing a string controlled by the user as the source into a fixed length buffer located on the stack. Successful exploitation can lead to code execution under the context of the service.

*Credits: Andrea Micalizzi aka rgodAbdulAziz Hariri
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-04-01 CVE Reserved
  • 2010-04-06 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ca
Search vendor "Ca"
Xosoft Content Distribution
Search vendor "Ca" for product "Xosoft Content Distribution"
r12.0
Search vendor "Ca" for product "Xosoft Content Distribution" and version "r12.0"
-
Affected
Ca
Search vendor "Ca"
Xosoft Content Distribution
Search vendor "Ca" for product "Xosoft Content Distribution"
r12.5
Search vendor "Ca" for product "Xosoft Content Distribution" and version "r12.5"
-
Affected
Ca
Search vendor "Ca"
Xosoft High Availability
Search vendor "Ca" for product "Xosoft High Availability"
r12.0
Search vendor "Ca" for product "Xosoft High Availability" and version "r12.0"
-
Affected
Ca
Search vendor "Ca"
Xosoft High Availability
Search vendor "Ca" for product "Xosoft High Availability"
r12.5
Search vendor "Ca" for product "Xosoft High Availability" and version "r12.5"
-
Affected
Ca
Search vendor "Ca"
Xosoft Replication
Search vendor "Ca" for product "Xosoft Replication"
r12.0
Search vendor "Ca" for product "Xosoft Replication" and version "r12.0"
-
Affected
Ca
Search vendor "Ca"
Xosoft Replication
Search vendor "Ca" for product "Xosoft Replication"
r12.5
Search vendor "Ca" for product "Xosoft Replication" and version "r12.5"
-
Affected