Check Point Reference: | CPAI-2008-107 |
Date Published: | 25 Jul 2008 |
Severity: | Medium |
Last Updated: | Monday 28 July, 2008 |
Source: | Secunia Advisory: SA29837 |
Industry Reference: | CVE-2008-1786 |
Protection Provided by: | |
Who is Vulnerable? | CA BrightStor ARCserve Backup for Laptops and Desktops r11.5 CA Desktop and Server Management r11.1 (GA, a, C1) CA Desktop and Server Management r11.2 CA Desktop and Server Management r11.2a CA Desktop and Server Management r11.2 C1 CA Desktop and Server Management r11.2 C2 CA Desktop Management Suite r11.1(GA, a, C1) CA Desktop Management Suite r11.2 CA Desktop Management Suite r11.2a CA Desktop Management Suite r11.2 C1 CA Desktop Management Suite r11.2 C2 CA Unicenter Asset Management r11.1 (GA, a, C1) CA Unicenter Asset Management r11.2 CA Unicenter Asset Management r11.2a CA Unicenter Asset Management r11.2 C1 CA Unicenter Asset Management r11.2 C2 CA Unicenter Desktop Management Bundle r11.1 (GA, a, C1) CA Unicenter Desktop Management Bundle r11.2 CA Unicenter Desktop Management Bundle r11.2a CA Unicenter Desktop Management Bundle r11.2 C1 CA Unicenter Desktop Management Bundle r11.2 C2 CA Unicenter Software Delivery r11.1 (GA, a, C1) CA Unicenter Software Delivery r11.2 CA Unicenter Software Delivery r11.2a CA Unicenter Software Delivery r11.2 C1 CA Unicenter Software Delivery r11.2 C2 CA Unicenter Remote Control r11.1 (GA, a, C1) CA Unicenter Remote Control r11.2 CA Unicenter Remote Control r11.2a CA Unicenter Remote Control r11.2 C1 CA Unicenter Remote Control r11.2 C2 |
Vulnerability Description | A memory corruption vulnerability has been reported in CA Multiple Products. Computer Associates (CA) provides a group of security and management products for enterprise as well as individual clients. A remote attacker may exploit this vulnerability to execute arbitrary code on a vulnerable system. |
Update/Patch Avaliable | Apply updates: CA |
Vulnerability Details | The vulnerability is due to errors within the gui_cm_ctrls ActiveX Control when handling certain function arguments. A remote attacker might exploit this vulnerability via a specially crafted web page. Successful exploitation of this issue may allow the attacker to execute arbitrary code on the vulnerable system. |