CVE-2011-0758
CA ETrust Secure Content Manager Common Services Transport Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow.
El componente eCS (ECSQdmn.exe) en CA ETrust Secure Content Manager versión 8.0 y CA Gateway Security versión 8.1, permite a los atacantes remotos causar una denegación de servicio (bloqueo) y ejecutar código arbitrario por medio de una petición especialmente diseñada hacia el puerto 1882, que implica un cálculo de enteros incorrecto y un desbordamiento de búfer en la región heap de la memoria.
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates eTrust Secure Content Manager. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the eTrust Common Services Transport (ECSQdmn.exe) running on port 1882. When making a request to this service a user supplied DWORD value is used in a memory copy operation. Due to the lack of bounds checking an integer can be improperly calculated leading to a heap overflow. If successfully exploited this vulnerability will result in a remote system compromise with SYSTEM credentials.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-02-02 CVE Reserved
- 2011-02-07 CVE Published
- 2024-07-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-189: Numeric Errors
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca | X_refsource_misc | |
http://osvdb.org/70840 | Vdb Entry | |
http://securityreason.com/securityalert/8075 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/516277/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/46253 | Vdb Entry | |
http://www.securitytracker.com/id?1025052 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-11-059 | X_refsource_misc | |
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BEE6F16E1-6E05-4890-A739-2B9F745C721F%7D | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/43200 | 2023-11-07 | |
http://www.vupen.com/english/advisories/2011/0306 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ca Search vendor "Ca" | Etrust Secure Content Manager Search vendor "Ca" for product "Etrust Secure Content Manager" | 8.0 Search vendor "Ca" for product "Etrust Secure Content Manager" and version "8.0" | - |
Affected
| ||||||
Ca Search vendor "Ca" | Gateway Security Search vendor "Ca" for product "Gateway Security" | 8.1 Search vendor "Ca" for product "Gateway Security" and version "8.1" | - |
Affected
|