VID |
23155 |
Severity |
40 |
Port |
5250 |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The CA iGateway service, according to its version number, has a buffer overflow vulnerability via the Content-Length header field. The iGateway service for various Computer Associates (CA) iTechnology products, in iTechnology iGateway versions prior to 4.0.051230 is vulnerable to a heap-based buffer overflow vulnerability, caused by improper handling of negative HTTP Content-Length values. By sending a specially-crafted HTTP request with a negative Content-Length parameter to port 5250, a remote attacker could exploit this flaw and execute arbitrary code on the affected host.
* References: http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33778 http://supportconnectw.ca.com/public/ca_common_docs/igatewaysecurity_notice.asp http://www.idefense.com/intelligence/vulnerabilities/display.php?id=376 http://www.frsirt.com/english/advisories/2006/0311 http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041683.html
* Platforms Affected: Multiple Computer Associates' products Any operating system Any version |
Recommendation |
Apply the appropriate patch for this vulnerability (iGateway version 4.0.051230 or later), available from the Computer Associates Patch Download Web site at http://supportconnectw.ca.com/public/ca_common_docs/igatewaypatch_index.asp |
Related URL |
CVE-2005-3653 (CVE) |
Related URL |
16354 (SecurityFocus) |
Related URL |
24269 (ISS) |
|