CA ARCserve D2D Session Handling Vulnerability

2011.08.16
Credit: rgod
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-200


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

CA20110809-01: Security Notice for CA ARCserve D2D Issued: August 9, 2011 CA Technologies support is alerting customers to a security risk associated with CA ARCserve D2D. A vulnerability exists that can allow a remote attacker to access credentials and execute arbitrary commands. CA Technologies has issued a patch to address the vulnerability. The vulnerability, CVE-2011-3011, is due to improper session handling. A remote attacker can access credentials and execute arbitrary commands. Risk Rating High Platform Windows Affected Products CA ARCserve D2D r15 How to determine if the installation is affected Search under TOMCAT directory for "BaseServiceImpl.class", and if the date is earlier than August 03, 2011, then you should apply fix RO33517. Solution CA has issued a patch to address the vulnerability. CA ARCserve D2D r15: RO33517 Workaround None References CVE-2011-3011 - CA ARCserve D2D session handling vulnerability Acknowledgement None Change History Version 1.0: Initial Release If additional information is required, please contact CA Technologies Support at support.ca.com If you discover a vulnerability in a CA Technologies product, please report your findings to the CA Technologies Product Vulnerability Response Team. support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782 Note: Original security notice can be found here (URL may wrap): https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={7D3 ACC0F-6C01-4BE2-B5C0-C430CEB45BE6} Thanks and regards, Ken Williams, Director ca technologies Product Vulnerability Response Team ca technologies Business Unit Operations wilja22 @ ca.com

References:

http://www.securityfocus.com/bid/48897
http://www.securityfocus.com/archive/1/archive/1/519234/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top