Advisory Details

July 20th, 2011

CA Total Defense Suite Gateway Security Malformed HTTP Packet Remote Code Execution Vulnerability

ZDI-11-237
ZDI-CAN-1017

CVE ID CVE-2011-2667
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS CA
AFFECTED PRODUCTS Total Defense Suite
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['11478']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CA Total Defense Suite r12. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the Icihttp.exe module (CA Gateway Security for HTTP), which responds to incoming HTTP requests on port 8080. Due to a flawed copy-loop algorithm in the URL parsing routine, it is possible for a remote unauthenticated user to cause an exploitable heap corruption condition. This could result in the execution of arbitrary code under the context of the Gateway Security service.

ADDITIONAL DETAILS

CA20110720-01: Security Notice for CA Gateway Security and Total Defense

https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7b5E404992-6B58-4C44-A29D-027D05B6285D%7d


DISCLOSURE TIMELINE
  • 2011-01-21 - Vulnerability reported to vendor
  • 2011-07-20 - Coordinated public release of advisory
CREDIT Andrea Micalizzi aka rgod
BACK TO ADVISORIES