ID

VAR-201102-0158


CVE

CVE-2011-0758


TITLE

CA ETrust Secure Content Manager and CA Gateway Securit of eCS In the component Service operation interruption (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-004240

DESCRIPTION

The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates eTrust Secure Content Manager. Authentication is not required to exploit this vulnerability.The specific flaw exists in the eTrust Common Services Transport (ECSQdmn.exe) running on port 1882. When making a request to this service a user supplied DWORD value is used in a memory copy operation. Due to the lack of bounds checking an integer can be improperly calculated leading to a heap overflow. If successfully exploited this vulnerability will result in a remote system compromise with SYSTEM credentials. Failed exploit attempts will result in a denial-of-service condition. ---------------------------------------------------------------------- Get a tax break on purchases of Secunia Solutions! If you are a U.S. company, you may be qualified for a tax break for your software purchases. Learn more at: http://secunia.com/products/corporate/vim/section_179/ ---------------------------------------------------------------------- TITLE: CA Secure Content Manager Common Services Transport Vulnerability SECUNIA ADVISORY ID: SA43200 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43200/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43200 RELEASE DATE: 2011-02-10 DISCUSS ADVISORY: http://secunia.com/advisories/43200/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43200/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43200 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in CA Secure Content Manager, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to missing input validation in the eTrust Common Services Transport (ECSQdmn.exe) service when parsing requests and can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to port 1882. * CA Gateway Security version 8.1. SOLUTION: Restrict access to the affected service. PROVIDED AND/OR DISCOVERED BY: Sebastian Apelt via ZDI. ORIGINAL ADVISORY: ZDI: http://www.zerodayinitiative.com/advisories/ZDI-11-059/ CA: https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={EE6F16E1-6E05-4890-A739-2B9F745C721F} OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ZDI-11-059: CA ETrust Secure Content Manager Common Services Transport Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-11-059 February 7, 2011 - This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 180 day deadline. To view mitigations for this vulnerability please see: http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca -- CVE ID: CVE-2011-0758 -- CVSS: 10, (AV:N/AC:L/Au:N/C:C/I:C/A:C) -- Affected Vendors: CA -- Affected Products: CA eTrust Secure Content Manager -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 6184. Authentication is not required to exploit this vulnerability. -- Disclosure Timeline: 2008-05-23 - Vulnerability reported to vendor 2011-02-07 - Public release of advisory -- Credit: This vulnerability was discovered by: * Sebastian Apelt (sebastian.apelt@siberas.de) -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 2.79

sources: NVD: CVE-2011-0758 // JVNDB: JVNDB-2011-004240 // ZDI: ZDI-11-059 // BID: 46253 // VULHUB: VHN-48703 // PACKETSTORM: 98339 // PACKETSTORM: 98243

AFFECTED PRODUCTS

vendor:camodel:etrust secure content managerscope:eqversion:8.0

Trust: 2.4

vendor:camodel:gateway securityscope:eqversion:8.1

Trust: 2.4

vendor:camodel:etrust secure content managerscope: - version: -

Trust: 0.7

vendor:computermodel:associates etrust secure content managerscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates etrust secure content manager sp1scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:8.1

Trust: 0.3

sources: ZDI: ZDI-11-059 // BID: 46253 // JVNDB: JVNDB-2011-004240 // CNNVD: CNNVD-201102-129 // NVD: CVE-2011-0758

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0758
value: HIGH

Trust: 1.0

NVD: CVE-2011-0758
value: HIGH

Trust: 0.8

ZDI: CVE-2011-0758
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201102-129
value: CRITICAL

Trust: 0.6

VULHUB: VHN-48703
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0758
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

VULHUB: VHN-48703
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-11-059 // VULHUB: VHN-48703 // JVNDB: JVNDB-2011-004240 // CNNVD: CNNVD-201102-129 // NVD: CVE-2011-0758

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-48703 // JVNDB: JVNDB-2011-004240 // NVD: CVE-2011-0758

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 98243 // CNNVD: CNNVD-201102-129

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201102-129

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-004240

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-48703

PATCH

title:CA20110208-01: Security Advisory for CA Secure Content Manager, Gateway Securityurl:https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BEE6F16E1-6E05-4890-A739-2B9F745C721F%7D

Trust: 0.8

title:CA has issued an update to correct this vulnerability.{EE6F16E1-6E05-4890-A739-2B9F745C721F}url:https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=

Trust: 0.7

sources: ZDI: ZDI-11-059 // JVNDB: JVNDB-2011-004240

EXTERNAL IDS

db:NVDid:CVE-2011-0758

Trust: 3.6

db:ZDIid:ZDI-11-059

Trust: 2.6

db:BIDid:46253

Trust: 2.0

db:SECUNIAid:43200

Trust: 1.9

db:VUPENid:ADV-2011-0306

Trust: 1.7

db:OSVDBid:70840

Trust: 1.1

db:SREASONid:8075

Trust: 1.1

db:SECTRACKid:1025052

Trust: 1.1

db:JVNDBid:JVNDB-2011-004240

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-342

Trust: 0.7

db:CNNVDid:CNNVD-201102-129

Trust: 0.7

db:BUGTRAQid:20110207 ZDI-11-059: CA ETRUST SECURE CONTENT MANAGER COMMON SERVICES TRANSPORT REMOTE CODE EXECUTION VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:98243

Trust: 0.2

db:VULHUBid:VHN-48703

Trust: 0.1

db:PACKETSTORMid:98339

Trust: 0.1

sources: ZDI: ZDI-11-059 // VULHUB: VHN-48703 // BID: 46253 // JVNDB: JVNDB-2011-004240 // PACKETSTORM: 98339 // PACKETSTORM: 98243 // CNNVD: CNNVD-201102-129 // NVD: CVE-2011-0758

REFERENCES

url:http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca

Trust: 2.1

url:http://www.zerodayinitiative.com/advisories/zdi-11-059

Trust: 1.8

url:http://www.securityfocus.com/bid/46253

Trust: 1.7

url:http://secunia.com/advisories/43200

Trust: 1.7

url:http://www.vupen.com/english/advisories/2011/0306

Trust: 1.7

url:http://www.securityfocus.com/archive/1/516277/100/0/threaded

Trust: 1.1

url:https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentid=%7bee6f16e1-6e05-4890-a739-2b9f745c721f%7d

Trust: 1.1

url:http://osvdb.org/70840

Trust: 1.1

url:http://www.securitytracker.com/id?1025052

Trust: 1.1

url:http://securityreason.com/securityalert/8075

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0758

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0758

Trust: 0.8

url:https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentid=

Trust: 0.7

url:http://www.securityfocus.com/archive/1/archive/1/516277/100/0/threaded

Trust: 0.6

url: http://www.ca.com/us/products/product.aspx?id=4673

Trust: 0.3

url:https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentid={ee6f16e1-6e05-4890-a739-2b9f745c721f}

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/section_179/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-11-059/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43200

Trust: 0.1

url:http://secunia.com/advisories/43200/#comments

Trust: 0.1

url:http://secunia.com/advisories/43200/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://twitter.com/thezdi

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0758

Trust: 0.1

sources: ZDI: ZDI-11-059 // VULHUB: VHN-48703 // BID: 46253 // JVNDB: JVNDB-2011-004240 // PACKETSTORM: 98339 // PACKETSTORM: 98243 // CNNVD: CNNVD-201102-129 // NVD: CVE-2011-0758

CREDITS

Sebastian Apelt (sebastian.apelt@siberas.de)

Trust: 0.7

sources: ZDI: ZDI-11-059

SOURCES

db:ZDIid:ZDI-11-059
db:VULHUBid:VHN-48703
db:BIDid:46253
db:JVNDBid:JVNDB-2011-004240
db:PACKETSTORMid:98339
db:PACKETSTORMid:98243
db:CNNVDid:CNNVD-201102-129
db:NVDid:CVE-2011-0758

LAST UPDATE DATE

2025-04-11T23:12:11.343000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-11-059date:2011-02-07T00:00:00
db:VULHUBid:VHN-48703date:2018-10-09T00:00:00
db:BIDid:46253date:2011-02-07T00:00:00
db:JVNDBid:JVNDB-2011-004240date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201102-129date:2011-07-06T00:00:00
db:NVDid:CVE-2011-0758date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:ZDIid:ZDI-11-059date:2011-02-07T00:00:00
db:VULHUBid:VHN-48703date:2011-02-10T00:00:00
db:BIDid:46253date:2011-02-07T00:00:00
db:JVNDBid:JVNDB-2011-004240date:2012-03-27T00:00:00
db:PACKETSTORMid:98339date:2011-02-09T09:16:47
db:PACKETSTORMid:98243date:2011-02-07T20:31:00
db:CNNVDid:CNNVD-201102-129date:2011-02-10T00:00:00
db:NVDid:CVE-2011-0758date:2011-02-10T18:00:59.130