Summary
This host is installed with CA Host-Based Intrusion Prevention System(HIPS) and is prone to a remote code-execution vulnerability.
Impact
Successful exploitation could allow attackers to execute arbitrary code in the context of the logged-in user. Failed exploits result in denial-of-service conditions.
Impact Level: Application
Solution
Vendor has released a patch to fix this issue, refer below link for patch information.
https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=RO26950&actionID=4
*****
NOTE : Ignore this warning, if above mentioned patch is already applied.
*****
CA Internet Security Suite (ISS):
For updates refer to
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={53A608DF-BFDB-4AB3-A98F-E4BB6BC7A2F4}
Insight
The flaw is caused by a design error in the XMLSecDB ActiveX control installed with the HIPSEngine component, which could allow attackers to create arbitrary files on a vulnerable system by tricking a user into visiting a web page which calls the 'SetXml()' and 'Save()' methods.
Affected
CA Internet Security Suite (ISS) 2010
CA Internet Security Suite (ISS) 2011
CA Host-Based Intrusion Prevention System (HIPS) r8.1
References
Severity
Classification
-
CVE CVE-2011-1036 -
CVSS Base Score: 8.8
AV:N/AC:M/Au:N/C:N/I:C/A:C
Related Vulnerabilities
- Adobe Acrobat Multiple Unspecified Vulnerabilities - Windows
- Adobe Acrobat and Reader 'printSeps()' Function Heap Corruption Vulnerability
- Adobe Air Multiple Vulnerabilities - November12 (Mac OS X)
- Adobe Extension Manager CS5 Insecure Library Loading Vulnerability (Win)
- Adobe AIR Multiple Vulnerabilities-01 Aug14 (Windows)