Handler on Duty: Didier Stevens
Threat Level: green
Loading...
|
|
Submitted By | Date |
---|---|
Comment | |
David Taylor | 2009-10-04 18:45:22 |
A vulnerability has been identified in various Computer Associates products, which could be exploited by remote attackers to execute arbitrary commands. This flaw is due to a buffer overflow error in the iGateway component that does not properly handle specially crafted HTTP GET requests (port 5250) when debug mode is enabled, which could be exploited by remote attackers to execute arbitrary commands and compromise a vulnerable system. Note : iGateway is shipped with multiple Computer Associates products, however, "debug" mode is not enabled by default. | |
Aritana Falconi | 2005-10-14 01:24:48 |
A vulnerability has been identified in various Computer Associates products, which could be exploited by remote attackers to execute arbitrary commands. This flaw is due to a buffer overflow error in the iGateway component that does not properly handle specially crafted HTTP GET requests (port 5250) when debug mode is enabled, which could be exploited by remote attackers to execute arbitrary commands and compromise a vulnerable system. More details: http://www.frsirt.com/english/advisories/2005/2028 | |
Steve Ryckman | 2005-10-14 00:43:46 |
Not much information, but the French Security Incident Response Team has the following information on port 5250 posted. Looks like another Computer Associates exploit...... http://www.frsirt.com/exploits/20051010.caigw.c.php |
CVE # | Description |
---|