CA Gateway Security Malformed HTTP Packet Remote Code Execution

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a security application that is
affected by a code execution vulnerability.

Description :

According to its version number, the CA Gateway Security install on
the remote Windows host is affected by a code execution vulnerability
caused by a heap corruption condition when handling specially crafted
HTTP requests on port 8080.

A remote, unauthenticated attacker could exploit this flaw and execute
arbitrary code on the host subject to the privileges of the user
running the affected application.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-11-237
http://seclists.org/bugtraq/2011/Jul/128
http://www.nessus.org/u?5d309d2b
http://www.nessus.org/u?3dfd61d0

Solution :

Upgrade to CA Gateway Security 9.0 or later, or apply the fix
referenced in the advisory.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 55692 ()

Bugtraq ID: 48813

CVE ID: CVE-2011-2667

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now