Check Point Advisories

CA License Software PUTOLF Buffer Overflow (CVE-2005-0582)

Check Point Reference: CPAI-2005-203
Date Published: 17 Nov 2009
Severity: Critical
Last Updated: Tuesday 17 November, 2009
Source:
Industry Reference:CVE-2005-0582
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description Computer Associates implements a license server/client mechanism in most of its products to provide control over product licenses. The CA License package is a license management tool that allows CA customers to register and manage their product licenses on a computer network. Normally a license server stores licenses in a central location for centralized license management. This server is queried by clients for a valid a license in order to execute. The server is able to keep track of the number of machines that use the licenses at any one time, and is able to determine if there are more licenses available for use. A vulnerability has been reported in the CA License software of CA products. The CA License software is a license management tool that allows CA customers to register and manage their product licenses on a computer network. It is prone to a buffer overflow when parsing a crafted PUTOLF message. The flaw may allow a malicious user to execute code on the vulnerable system with system or root level privileges. In a simple attack case, aimed at creating a denial of service condition, the affected service will terminate. If the service is not configured to restart automatically, then the CA License package functionality of CA products will be unavailable following an attack. In the case of the server component being successfully terminated, CA products that require a license from the server will be unable to function normally. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature and intent of the injected code. The code will execute with the privileges of Local System or root.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the CA License Software PUTOLF Buffer Overflow protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  CA Products Enforcement Violation.
Attack Information:  CA License Software PUTOLF buffer overflow

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK