In association with heise online

01 March 2007, 09:36

DoS vulnerability in CA's intrusion detection products

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

A vulnerability in CA's eTrust Intrusion Detection solution can be exploited to shut down the administration service. According to iDefense, all an attacker needs to do is to send manipulated packets during log-in to the service listening on TCP port 9191. When a defective session key is transferred to protect the connection, the service overflows the heap, causing a crash. This security hole affects eTrust Intrusion Detection 2.0 SP1, 3.0 and 3.0 SP1. CA has issued patches to solve the problem.

See also:


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit