CA Gateway Security Malformed HTTP Packet Remote Code Execution

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.

Synopsis :

The remote Windows host contains a security application that is
affected by a code execution vulnerability.

Description :

According to its version number, the CA Gateway Security install on
the remote Windows host is affected by a code execution vulnerability
caused by a heap corruption condition when handling specially crafted
HTTP requests on port 8080.

A remote, unauthenticated attacker could exploit this flaw and execute
arbitrary code on the host subject to the privileges of the user
running the affected application.

See also :

Solution :

Upgrade to CA Gateway Security 9.0 or later, or apply the fix
referenced in the advisory.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 55692 ()

Bugtraq ID: 48813

CVE ID: CVE-2011-2667

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now