Korean
<< Back
VID 23155
Severity 40
Port 5250
Protocol TCP
Class CGI
Detailed Description The CA iGateway service, according to its version number, has a buffer overflow vulnerability via the Content-Length header field. The iGateway service for various Computer Associates (CA) iTechnology products, in iTechnology iGateway versions prior to 4.0.051230 is vulnerable to a heap-based buffer overflow vulnerability, caused by improper handling of negative HTTP Content-Length values. By sending a specially-crafted HTTP request with a negative Content-Length parameter to port 5250, a remote attacker could exploit this flaw and execute arbitrary code on the affected host.

* References:
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33778
http://supportconnectw.ca.com/public/ca_common_docs/igatewaysecurity_notice.asp
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=376
http://www.frsirt.com/english/advisories/2006/0311
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041683.html

* Platforms Affected:
Multiple Computer Associates' products
Any operating system Any version
Recommendation Apply the appropriate patch for this vulnerability (iGateway version 4.0.051230 or later), available from the Computer Associates Patch Download Web site at http://supportconnectw.ca.com/public/ca_common_docs/igatewaypatch_index.asp
Related URL CVE-2005-3653 (CVE)
Related URL 16354 (SecurityFocus)
Related URL 24269 (ISS)