ID

VAR-200712-0115


CVE

CVE-2007-6334


TITLE

plural CA Used in products Windows of Ingres Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2007-004712

DESCRIPTION

Ingres 2.5 and 2.6 on Windows, as used in multiple CA products and possibly other products, assigns the privileges and identity of users to be the same as the first user, which allows remote attackers to gain privileges. Ingres is prone to an unauthorized-access security vulnerability because of a flaw in user authentication. Attackers can exploit this issue to gain unauthorized access to the affected database. Successful exploits can allow attackers to access, create, or modify data; other attacks are possible. This issue affects Ingres 2.5 and 2.6 when running on Windows. NOTE: This issue does not affect the Ingres .NET data provider. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Ingres User Authentication Security Issue SECUNIA ADVISORY ID: SA28187 VERIFY ADVISORY: http://secunia.com/advisories/28187/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From local network SOFTWARE: Ingres 2.x http://secunia.com/product/14576/ DESCRIPTION: A security issue has been reported in Ingres, which potentially can be exploited by malicious users to bypass certain security restrictions. and 2.6 on Windows. SOLUTION: Apply fixes (requires login): http://servicedesk.ingres.com/CAisd/pdmweb.ingres?OP=SHOW_DETAIL+PERSID=KD:415703+HTMPL=kt_document_view.htmpl PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: Ingres: http://www.ingres.com/support/security-alertDec17.php ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Title: [CAID 35970]: CA Products That Embed Ingres Authentication Vulnerability CA Vuln ID (CAID): 35970 CA Advisory Date: 2007-12-19 Reported By: Ingres Corporation Impact: Attacker can gain elevated privileges. Summary: A potential vulnerability exists in the Ingres software that is embedded in various CA products. This vulnerability exists only on Ingres 2.5 and Ingres 2.6 on Windows, and does not manifest itself on any Unix platform. Ingres r3 and Ingres 2006 are not affected. In all reported instances, the application (typically an ASP.NET application using the Ingres ODBC driver) was running on Microsoft IIS Web server, and with the Integrated Windows Authentication (IWA) option enabled. While IWA is not enabled by default, it is a commonly used option. Mitigating Factors: The vulnerability exists only on Windows systems running Microsoft IIS Web server that have the Integrated Windows Authentication (IWA) option enabled. Severity: CA has given this vulnerability a High risk rating. Affected Products: All CA products that embed Ingres 2.5 and Ingres 2.6, and also run Microsoft IIS Web server with the Integrated Windows Authentication (IWA) option enabled. Affected Platforms: Windows Status and Recommendation (URLs may wrap): Ingres has issued the following patches to address the vulnerabilities. Ingres 2.6 Single-Byte patch - Ingres 2.6 Single-Byte patch ftp://ftp.ca.com/caproducts/ips/MDB/Generic_Ingres/IIS_Vulnerability/patch-2.6.0701.12467-win-x86.zip Ingres 2.6 Double-Byte patch- Ingres 2.6 Double-Byte patch ftp://ftp.ca.com/caproducts/ips/MDB/Generic_Ingres/IIS_Vulnerability/patch-2.6.0701.12473-win-x86-DBL.zip Ingres 2.5 Single Byte Patch- Ingres 2.5 Single Byte patch ftp://ftp.ca.com/caproducts/ips/MDB/Generic_Ingres/IIS_Vulnerability/patch-2.5.0605.12291-win-x86.zip Potential problems installing the patches: While testing these patches, CA identified an install issue when the user is presented with the option to make a backup of the Ingres installation. In cases where a <space> is in the path, the path is not properly read. The backup does get taken and is by default stored in the %II_SYSTEM%\ingres\install\backup directory. Additionally, if the user happens to press the "Set Directory" button, the path will be displayed. Clicking "ok" will result in a message stating "... spaces are not supported in paths... ". This also is an error; pressing cancel will return the user to the first screen with the default path, and while the displayed path is terminated at a space, the actual path does work. To avoid this issue, use DOS 8.3 definitions (ex. C:\progra~1\CA\ingres). How to determine if you are affected: Check the %II_SYSTEM%\ingres\version.rel file to identify the Ingres version. If the installed version of Ingres 2.6 is a Double-Byte version (should have DBL referenced), please download the 2.6 Double-Byte patch. Otherwise, use the Single-Byte patch. Workaround: None References (URLs may wrap): CA SupportConnect: http://supportconnect.ca.com/ Important Security Notice for Customers Using Products that Embed Ingres on Microsoft Windows ONLY http://supportconnectw.ca.com/public/ingres/infodocs/ingresmswin-secnot.asp Solution Document Reference APARs: N/A CA Security Response Blog posting: CA Products That Embed Ingres Authentication Vulnerability http://community.ca.com/blogs/casecurityresponseblog/archive/2007/12/19.aspx CA Vuln ID (CAID): 35970 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35970 Reported By: Ingres Corporation http://ingres.com/support/security.php http://ingres.com/support/security-alertDec17.php CVE References: CVE-2007-6334 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6334 OSVDB References: 39358 http://osvdb.org/39358 Changelog for this advisory: v1.0 - Initial Release Customers who require additional information should contact CA Technical Support at http://supportconnect.ca.com. For technical questions or comments related to this advisory, please send email to vuln AT ca DOT com. If you discover a vulnerability in CA products, please report your findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability" form. URL: http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx Regards, Ken Williams ; 0xE2941985 Director, CA Vulnerability Research CA, 1 CA Plaza, Islandia, NY 11749 Contact http://www.ca.com/us/contact/ Legal Notice http://www.ca.com/us/legal/ Privacy Policy http://www.ca.com/us/privacy/ Copyright (c) 2007 CA. All rights reserved. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: CA Products Ingres User Authentication Security Issue SECUNIA ADVISORY ID: SA28183 VERIFY ADVISORY: http://secunia.com/advisories/28183/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From local network SOFTWARE: BrightStor ARCserve Backup 11.x http://secunia.com/product/312/ BrightStor ARCserve Backup 9.x http://secunia.com/product/313/ BrightStor Enterprise Backup 10.x http://secunia.com/product/314/ BrightStor Storage Command Center 11.x http://secunia.com/product/14581/ BrightStor Storage Resource Manager 11.x http://secunia.com/product/5909/ CA Advantage Data Transformer 2.x http://secunia.com/product/5904/ CA AllFusion Enterprise Workbench 1.x http://secunia.com/product/14579/ CA AllFusion Enterprise Workbench 7.x http://secunia.com/product/14580/ CA AllFusion Harvest Change Manager 7.x http://secunia.com/product/5905/ CA ARCserve Backup for Laptops & Desktops 11.x http://secunia.com/product/5906/ CA CleverPath Aion 10.x http://secunia.com/product/5582/ CA CleverPath Predictive Analysis Server 3.x http://secunia.com/product/5581/ CA Embedded Entitlements Manager 8.x http://secunia.com/product/14582/ CA eTrust Admin 8.x http://secunia.com/product/5584/ CA eTrust Audit 8.x http://secunia.com/product/5912/ CA Network Forensics 8.x http://secunia.com/product/14585/ CA Unicenter Advanced Systems Management 11.x http://secunia.com/product/14587/ CA Unicenter Asset Intelligence 11.x http://secunia.com/product/14588/ CA Unicenter Asset Management 11.x http://secunia.com/product/14589/ CA Unicenter Asset Portfolio Management 11.x http://secunia.com/product/7125/ CA Unicenter Database Command Center 11.x http://secunia.com/product/12928/ CA Unicenter Desktop and Server Management 11.x http://secunia.com/product/14590/ CA Unicenter Desktop Management Suite 11.x http://secunia.com/product/14591/ CA Unicenter Enterprise Job Manager 1.x http://secunia.com/product/5588/ CA Unicenter Job Management Option 11.x http://secunia.com/product/14592/ CA Unicenter Lightweight Portal 2.x http://secunia.com/product/14593/ CA Unicenter Management Portal 3.x http://secunia.com/product/3936/ CA Unicenter Network and Systems Management (NSM) 11.x http://secunia.com/product/14437/ CA Unicenter Network and Systems Management (NSM) 3.x http://secunia.com/product/1683/ CA Unicenter Patch Management 11.x http://secunia.com/product/14595/ CA Unicenter Remote Control 11.x http://secunia.com/product/14596/ CA Unicenter Remote Control 6.x http://secunia.com/product/2622/ CA Unicenter Service Accounting 11.x http://secunia.com/product/7127/ CA Unicenter Service Assure 11.x http://secunia.com/product/7128/ CA Unicenter Service Assure 2.x http://secunia.com/product/14597/ CA Unicenter Service Catalog 11.x http://secunia.com/product/7129/ CA Unicenter Service Delivery 11.x http://secunia.com/product/14598/ CA Unicenter Service Intelligence 11.x http://secunia.com/product/14599/ CA Unicenter Service Metric Analysis 11.x http://secunia.com/product/7126/ CA Unicenter Service Metric Analysis 3.x http://secunia.com/product/14600/ CA Unicenter ServicePlus Service Desk 11.x http://secunia.com/product/14602/ CA Unicenter ServicePlus Service Desk 5.x http://secunia.com/product/14601/ CA Unicenter ServicePlus Service Desk 6.x http://secunia.com/product/1684/ CA Unicenter Software Delivery 11.x http://secunia.com/product/7120/ CA Unicenter TNG 2.x http://secunia.com/product/3206/ CA Unicenter Web Services Distributed Management 3.x http://secunia.com/product/12199/ CA Unicenter Workload Control Center 1.x http://secunia.com/product/12932/ CA Wily SOA Manager 7.x http://secunia.com/product/14603/ eTrust Directory 8.x http://secunia.com/product/7114/ eTrust IAM Suite 8.x http://secunia.com/product/14583/ eTrust Identity Manager 8.x http://secunia.com/product/14584/ eTrust Secure Content Manager (SCM) http://secunia.com/product/3391/ eTrust Single Sign-On 7.x http://secunia.com/product/10747/ eTrust Web Access Control 1.x http://secunia.com/product/14586/ DESCRIPTION: A vulnerability has been reported in CA products, which can be exploited by malicious users to bypass certain security restrictions. SOLUTION: Apply patches (see the vendor's advisory for more information)

Trust: 2.16

sources: NVD: CVE-2007-6334 // JVNDB: JVNDB-2007-004712 // BID: 26959 // PACKETSTORM: 61984 // PACKETSTORM: 62040 // PACKETSTORM: 61983

AFFECTED PRODUCTS

vendor:ingresmodel:ingresscope:eqversion:2.6

Trust: 1.0

vendor:ingresmodel:ingresscope:eqversion:2.5

Trust: 1.0

vendor:ingresmodel:ingresscope:eqversion:2.5 and 2.6

Trust: 0.8

vendor:microsoftmodel:windows ntscope: - version: -

Trust: 0.6

vendor:computermodel:associates allfusion enterprise workbenchscope:eqversion:7.1

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job managerscope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter asset portfolio managementscope:eqversion:11.2.1

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.2

Trust: 0.3

vendor:computermodel:associates etrust admin sp1scope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates unicenter ca web services distributed managementscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.1

Trust: 0.3

vendor:computermodel:associates unicenter service metric analysisscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup 11.5.sp3scope: - version: -

Trust: 0.3

vendor:computermodel:associates allfusion enterprise workbench sp1scope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates etrust secure content manager sp1scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:10.5

Trust: 0.3

vendor:computermodel:associates allfusion harvest change managerscope:eqversion:7

Trust: 0.3

vendor:computermodel:associates unicenter remote controlscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter ca web services distributed managementscope:eqversion:3.11

Trust: 0.3

vendor:computermodel:associates unicenter tng 2.4.2jscope: - version: -

Trust: 0.3

vendor:computermodel:associates unicenter remote control sp1scope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp4scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates advantage plex for distributed systemsscope:eqversion:5.5

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup sp2scope:eqversion:11.5.2

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust admin sp2scope:eqversion:8.1.1

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp3scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter service intelligencescope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service desk sp3scope:eqversion:5.5

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates web service distributed managementscope:eqversion:3.50

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup 11.5.sp1scope: - version: -

Trust: 0.3

vendor:computermodel:associates etrust single sign-onscope:eqversion:7

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:9.01

Trust: 0.3

vendor:computermodel:associates allfusion enterprise workbenchscope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates unicenter service metric analysisscope:eqversion:3.0.2

Trust: 0.3

vendor:ingresmodel:databasescope:eqversion:2.6

Trust: 0.3

vendor:computermodel:associates unicenter service assurescope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter desktop and server managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates etrust identity managerscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates unicenter workload control center 1.0.sp4scope: - version: -

Trust: 0.3

vendor:computermodel:associates unicenter job management optionscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates cleverpath aionscope:eqversion:10.0

Trust: 0.3

vendor:computermodel:associates unicenter asset portfolio managementscope:eqversion:11.3

Trust: 0.3

vendor:computermodel:associates etrust audit sp2scope:eqversion:8

Trust: 0.3

vendor:computermodel:associates unicenter lightweight portalscope:eqversion:2

Trust: 0.3

vendor:computermodel:associates etrust web access controlscope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates web service distributed managementscope:eqversion:3.11

Trust: 0.3

vendor:computermodel:associates unicenter service assurescope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.5

Trust: 0.3

vendor:computermodel:associates unicenter service deliveryscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates cleverpath predictive analysis serverscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:5.5.1

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service desk sp1scope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter ca web services distributed managementscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates wily soa managerscope:eqversion:7.1

Trust: 0.3

vendor:ingresmodel:databasescope:eqversion:2.5

Trust: 0.3

vendor:computermodel:associates allfusion enterprise workbenchscope:eqversion:7

Trust: 0.3

vendor:computermodel:associates unicenter asset intelligencescope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter management portalscope:eqversion:3.1.1

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenterscope: - version: -

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup 11.5.sp2scope: - version: -

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.4.2

Trust: 0.3

vendor:computermodel:associates unicenter management portalscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.4

Trust: 0.3

vendor:computermodel:associates unicenter service accountingscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:5.5

Trust: 0.3

vendor:computermodel:associates unicenter ca web services distributed managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp1scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter service assurescope:eqversion:2.2

Trust: 0.3

vendor:computermodel:associates etrust admin sp2scope:eqversion:8.1.2

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter remote controlscope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter service deliveryscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter service catalogscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter workload control center sp3scope:eqversion:1

Trust: 0.3

vendor:computermodel:associates unicenter service accountingscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates arcserve backupscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:11.2

Trust: 0.3

vendor:computermodel:associates allfusion harvest change managerscope:eqversion:7.1

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp2scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:9.1

Trust: 0.3

vendor:computermodel:associates etrust directoryscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates advantage data transformerscope:eqversion:2.2

Trust: 0.3

vendor:computermodel:associates unicenter service metric analysisscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter service catalogscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:6.0.1

Trust: 0.3

vendor:computermodel:associates unicenter workload control center sp4scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter database command centerscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates etrust iam suitescope:eqversion:8

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter patch managementscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter desktop management suitescope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter service metric analysisscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates etrust admin sp2scope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates unicenter serviceplus service deskscope:eqversion:11

Trust: 0.3

vendor:computermodel:associates unicenter asset portfolio managementscope:eqversion:11.0

Trust: 0.3

sources: BID: 26959 // JVNDB: JVNDB-2007-004712 // NVD: CVE-2007-6334 // CNNVD: CNNVD-200712-299

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2007-6334
value: MEDIUM

Trust: 1.8

CNNVD: CNNVD-200712-299
value: MEDIUM

Trust: 0.6

NVD:
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2007-6334
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: JVNDB: JVNDB-2007-004712 // NVD: CVE-2007-6334 // CNNVD: CNNVD-200712-299

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.8

sources: JVNDB: JVNDB-2007-004712 // NVD: CVE-2007-6334

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200712-299

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200712-299

CONFIGURATIONS

sources: NVD: CVE-2007-6334

PATCH

title:contentID={EA69B32B-90DA-4BA6-A6A5-48C04C888524}url:https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentid={ea69b32b-90da-4ba6-a6a5-48c04c888524}

Trust: 0.8

sources: JVNDB: JVNDB-2007-004712

EXTERNAL IDS

db:NVDid:CVE-2007-6334

Trust: 2.8

db:BIDid:26959

Trust: 1.9

db:SECUNIAid:28187

Trust: 1.7

db:OSVDBid:39358

Trust: 1.7

db:SECUNIAid:28183

Trust: 1.7

db:VUPENid:ADV-2007-4303

Trust: 1.6

db:VUPENid:ADV-2007-4304

Trust: 1.6

db:SECTRACKid:1019134

Trust: 1.6

db:JVNDBid:JVNDB-2007-004712

Trust: 0.8

db:NSFOCUSid:11325

Trust: 0.6

db:BUGTRAQid:20071221 [CAID 35970]: CA PRODUCTS THAT EMBED INGRES AUTHENTICATION VULNERABILITY

Trust: 0.6

db:CNNVDid:CNNVD-200712-299

Trust: 0.6

db:PACKETSTORMid:61984

Trust: 0.1

db:PACKETSTORMid:62040

Trust: 0.1

db:PACKETSTORMid:61983

Trust: 0.1

sources: BID: 26959 // JVNDB: JVNDB-2007-004712 // PACKETSTORM: 61984 // PACKETSTORM: 62040 // PACKETSTORM: 61983 // NVD: CVE-2007-6334 // CNNVD: CNNVD-200712-299

REFERENCES

url:http://www.ingres.com/support/security-alertdec17.php

Trust: 2.1

url:http://supportconnectw.ca.com/public/ingres/infodocs/ingresmswin-secnot.asp

Trust: 2.1

url:http://secunia.com/advisories/28183

Trust: 1.6

url:http://secunia.com/advisories/28187

Trust: 1.6

url:http://www.osvdb.org/39358

Trust: 1.6

url:http://www.securityfocus.com/bid/26959

Trust: 1.6

url:http://www.securitytracker.com/id?1019134

Trust: 1.6

url:http://www.securityfocus.com/archive/1/485448/100/0/threaded

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/4303

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/4304

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6334

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6334

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/485448/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/4304

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/4303

Trust: 0.6

url:http://www.nsfocus.net/vulndb/11325

Trust: 0.6

url:http://servicedesk.ingres.com/caisd/pdmweb.ingres?op=show_detail+persid=kd:415703+htmpl=kt_document_view.htmpl

Trust: 0.4

url:http://www.ingres.com/

Trust: 0.3

url:/archive/1/485448

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/advisories/28187/

Trust: 0.2

url:https://psi.secunia.com/?page=changelog

Trust: 0.2

url:https://psi.secunia.com/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/product/14576/

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx

Trust: 0.1

url:http://supportconnect.ca.com.

Trust: 0.1

url:http://community.ca.com/blogs/casecurityresponseblog/archive/2007/12/19.aspx

Trust: 0.1

url:http://ingres.com/support/security.php

Trust: 0.1

url:http://supportconnect.ca.com/

Trust: 0.1

url:http://osvdb.org/39358

Trust: 0.1

url:http://www.ca.com/us/contact/

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35970

Trust: 0.1

url:http://www.ca.com/us/legal/

Trust: 0.1

url:http://ingres.com/support/security-alertdec17.php

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-6334

Trust: 0.1

url:http://www.ca.com/us/privacy/

Trust: 0.1

url:http://secunia.com/product/14595/

Trust: 0.1

url:http://secunia.com/product/14584/

Trust: 0.1

url:http://secunia.com/product/7126/

Trust: 0.1

url:http://secunia.com/product/5581/

Trust: 0.1

url:http://secunia.com/product/14590/

Trust: 0.1

url:http://secunia.com/product/14585/

Trust: 0.1

url:http://secunia.com/product/314/

Trust: 0.1

url:http://secunia.com/product/12932/

Trust: 0.1

url:http://secunia.com/product/14599/

Trust: 0.1

url:http://secunia.com/product/14592/

Trust: 0.1

url:http://secunia.com/product/14600/

Trust: 0.1

url:http://secunia.com/product/5912/

Trust: 0.1

url:http://secunia.com/product/14582/

Trust: 0.1

url:http://secunia.com/product/3391/

Trust: 0.1

url:http://secunia.com/product/12928/

Trust: 0.1

url:http://secunia.com/product/7127/

Trust: 0.1

url:http://secunia.com/product/14601/

Trust: 0.1

url:http://secunia.com/product/14603/

Trust: 0.1

url:http://secunia.com/advisories/28183/

Trust: 0.1

url:http://secunia.com/product/5906/

Trust: 0.1

url:http://secunia.com/product/14598/

Trust: 0.1

url:http://secunia.com/product/7129/

Trust: 0.1

url:http://secunia.com/product/14588/

Trust: 0.1

url:http://secunia.com/product/14597/

Trust: 0.1

url:http://secunia.com/product/14437/

Trust: 0.1

url:http://secunia.com/product/5904/

Trust: 0.1

url:http://secunia.com/product/14580/

Trust: 0.1

url:http://secunia.com/product/14587/

Trust: 0.1

url:http://secunia.com/product/3936/

Trust: 0.1

url:http://secunia.com/product/5582/

Trust: 0.1

url:http://secunia.com/product/7128/

Trust: 0.1

url:http://secunia.com/product/14596/

Trust: 0.1

url:http://secunia.com/product/14602/

Trust: 0.1

url:http://secunia.com/product/14583/

Trust: 0.1

url:http://secunia.com/product/14579/

Trust: 0.1

url:http://secunia.com/product/5905/

Trust: 0.1

url:http://secunia.com/product/3206/

Trust: 0.1

url:http://secunia.com/product/5588/

Trust: 0.1

url:http://secunia.com/product/5584/

Trust: 0.1

url:http://secunia.com/product/5909/

Trust: 0.1

url:http://secunia.com/product/2622/

Trust: 0.1

url:http://secunia.com/product/1684/

Trust: 0.1

url:http://secunia.com/product/12199/

Trust: 0.1

url:http://secunia.com/product/7125/

Trust: 0.1

url:http://secunia.com/product/1683/

Trust: 0.1

url:http://secunia.com/product/14589/

Trust: 0.1

url:http://secunia.com/product/7120/

Trust: 0.1

url:http://secunia.com/product/14581/

Trust: 0.1

url:http://secunia.com/product/14591/

Trust: 0.1

url:http://secunia.com/product/10747/

Trust: 0.1

url:http://secunia.com/product/313/

Trust: 0.1

url:http://secunia.com/product/14593/

Trust: 0.1

url:http://secunia.com/product/7114/

Trust: 0.1

url:http://secunia.com/product/14586/

Trust: 0.1

url:http://secunia.com/product/312/

Trust: 0.1

sources: BID: 26959 // JVNDB: JVNDB-2007-004712 // PACKETSTORM: 61984 // PACKETSTORM: 62040 // PACKETSTORM: 61983 // NVD: CVE-2007-6334 // CNNVD: CNNVD-200712-299

CREDITS

Bill Maimone

Trust: 0.6

sources: CNNVD: CNNVD-200712-299

SOURCES

db:BIDid:26959
db:JVNDBid:JVNDB-2007-004712
db:PACKETSTORMid:61984
db:PACKETSTORMid:62040
db:PACKETSTORMid:61983
db:NVDid:CVE-2007-6334
db:CNNVDid:CNNVD-200712-299

LAST UPDATE DATE

2023-12-18T13:58:17.618000+00:00


SOURCES UPDATE DATE

db:BIDid:26959date:2015-03-19T09:28:00
db:JVNDBid:JVNDB-2007-004712date:2012-09-25T00:00:00
db:NVDid:CVE-2007-6334date:2018-10-15T21:52:10.500
db:CNNVDid:CNNVD-200712-299date:2007-12-21T00:00:00

SOURCES RELEASE DATE

db:BIDid:26959date:2007-12-20T00:00:00
db:JVNDBid:JVNDB-2007-004712date:2012-09-25T00:00:00
db:PACKETSTORMid:61984date:2007-12-24T18:50:38
db:PACKETSTORMid:62040date:2007-12-24T19:52:23
db:PACKETSTORMid:61983date:2007-12-24T18:50:38
db:NVDid:CVE-2007-6334date:2007-12-20T23:46:00
db:CNNVDid:CNNVD-200712-299date:2007-12-20T00:00:00