Summary
This host is installed with CA Gateway Security and is prone to remote code execution Vulnerability.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code and cause denail of service.
Impact Level: System/Application
Solution
Apply patch for CA Gateway Security r8.1
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={5E404992-6B58-4C44-A29D-027D05B6285D}
Insight
The flaw is due to an error in the Icihttp.exe module, which can be exploited by sending a specially-crafted HTTP request to TCP port 8080.
Affected
CA Gateway Security 8.1
References
Severity
Classification
-
CVE CVE-2011-0419 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- Apple Safari Multiple Vulnerabilities Dec13 (Mac OS X)
- Apple Safari 'Webkit' Multiple Vulnerabilities-01 Mar14 (Mac OS X)
- Adobe Reader Plugin Signature Bypass Vulnerability (Mac OS X)
- AVG Anti-Virus 'hcp://' Protocol Handler Remote Code Execution Vulnerability
- Apache Tomcat Multiple Vulnerabilities-01 (Nov14)