Security vulnerabilities in CA products
iDefense has discovered a security vulnerability in the Alert Notification Service component of numerous CA products that can be exploited by remote attackers with a valid login for that domain to execute code with system privileges. CA has released updates which fix the vulnerabilities.
The Alert Notification Service provides functions for notification of system events. The service includes an RPC interface, various functions of which fail to check user parameters before copying them into fixed length buffers. Buffer overflows can thereby be caused, resulting in execution of injected code.
Updates for CA Anti-Virus for the Enterprise 7.1, r8 and r8.1, CA Threat Manager for the Enterprise r8 and r8.1 and BrightStor ARCserve Backup r11.1 and r11.5 are available. CA has included links to the updates in its security advisory. Administrators should download and install the updates immediately.
CA has also reported security vulnerabilities in its ARCserve Backup for Laptops and Desktops Server and Desktop Management Suite. Absence of user parameter length checking in the LGServer can result in a buffer overflow. The NetBackup service fails to check uploaded files properly. Both can be exploited to inject malicious code. CA has also released updates for these products. Server administrators should install them as soon as possible.
See also:
- Computer Associates Alert Notification Server Multiple RPC Buffer Overflow Vulnerabilities, security advisory from iDefense
- Security Notice for Alert Notification Server, security advisory from CA
- CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities, security advisory from CA on Full Disclosure
(mba)