Check Point Reference: | CPAI-2005-202 |
Date Published: | 16 Nov 2009 |
Severity: | Critical |
Last Updated: | Monday 16 November, 2009 |
Source: | |
Industry Reference: | CVE-2005-0581 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Computer Associates implements a license server/client mechanism in most of its products to provide control over product licenses. The CA License package is a license management tool that allows CA customers to register and manage their product licenses on a computer network. Normally a license server stores licenses in a central location for centralized license management. This server is queried by clients for a valid a license in order to execute. The server is able to keep track of the number of machines that use the licenses at any one time, and is able to determine if there are more licenses available for use. A vulnerability has been reported in the CA License software of CA products. The CA License software is a license management tool that allows CA customers to register and manage their product licenses on a computer network. It is prone to a buffer overflow when receiving a crafted GCR message. The flaw may allow a malicious user to execute code on the vulnerable system with system or root level privileges. In a simple attack case, aimed at creating a denial of service condition, the affected service will terminate. If the service is not configured to restart automatically, then the CA License package functionality of CA products will be unavailable following an attack. In the case of the server component being successfully terminated, CA products that require a license from the server will be unable to function normally. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature and intent of the injected code. The code will execute with the privileges of Local System or root. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: CA Products Enforcement Violation.
Attack Information: CA License Software GCR buffer overflow