Check Point Reference: | CPAI-2005-205 |
Date Published: | 18 Nov 2009 |
Severity: | Critical |
Last Updated: | Sunday 22 November, 2015 |
Source: | |
Industry Reference: | CVE-2005-0581 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A vulnerability has been reported in the CA License software of CA products. The CA License software is a license management tool that allows CA customers to register and manage their product licenses on a computer network. It is prone to a buffer overflow when logging a crafted message with an overly long invalid command. The flaw may allow a malicious user to execute code on the vulnerable system with system or root level privileges. In a simple attack case, aimed at creating a denial of service condition, the affected service will terminate. If the service is not configured to restart automatically, then the CA License package functionality of CA products will be unavailable following an attack. In the case of the server component being successfully terminated, CA products that require a license from the server will be unable to function normally. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature and intent of the injected code. The code will execute with the privileges of Local System or root. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: CA License Software invalid command buffer overflow