Check Point Reference: | CPAI-2005-201 |
Date Published: | 26 Oct 2009 |
Severity: | Critical |
Last Updated: | Monday 26 October, 2009 |
Source: | |
Industry Reference: | CVE-2005-0581 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Computer Associates implements a license server/client mechanism in most of its products to provide control over product licenses. Normally a license server stores licences in a central location for centralized license management. This server is queried by clients for a valid a license in order to execute. The server is able to keep track of the number of machines that use the licences at any one time, and is able to determine if there are more licenses available for use. A vulnerability has been reported in the CA License software of CA products. The CA License software is a license management tool that allows CA customers to register and manage their product licenses on a computer network. It is prone to a buffer overflow when receiving a crafted message. The flaw may allow a malicious user to execute code on the vulnerable system with system or root level privileges. In a simple attack case, aimed at creating a denial of service condition, the affected service will terminate. If the service is not configured to restart automatically, then the CA License package functionality of CA products will be unavailable following an attack. The CA License package is a license management tool that allows CA customers to register and manage their product licenses on a computer network. Without access to the license server, CA products that require a license from the server will be unable to execute normally. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature and intent of the injected code. The code will execute with the privileges of Local System or root. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: CA License Software GETCONFIG buffer overflow