CA HIPS Kmxfw.sys Driver Multiple Remote Vulnerabilities

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.


Synopsis :

The remote host contains a kernel driver that is affected by multiple
vulnerabilities.

Description :

The 'kmxfw.sys' kernel driver included with CA's Host-Based Intrusion
Prevention System (HIPS) or a related security product installed on
the remote host is affected by multiple vulnerabilities.

- By sending specially crafted IOCTL requests, it may be
possible for a local attacker to crash the system or
execute arbitrary code with kernel level privileges.
(CVE-2008-2926)

- An unspecified flaw may allow a remote attacker to crash
the system. (CVE-2008-3174)

See also :

http://www.trapkit.de/advisories/TKADV2008-006.txt
http://www.securityfocus.com/archive/1/495397
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36559
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36560

Solution :

Follow the instructions on the CA HIPS implementation guide to update
the CA HIPS client, and ensure the 'kmxfw.sys' driver is version
6.5.5.18 or later.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 5.8
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 33901 (ca_hips_kmxfw_sys_multiple_vuln.nasl)

Bugtraq ID: 30651

CVE ID: CVE-2008-2926
CVE-2008-3174

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now