Summary
This host is running CA Product(s), which is prone to Local Code Execution and Denial of Service Vulnerabilities.
Impact
A remote/local user can cause denial of service conditions or execute arbitrary code by sending a specially crafted IOCTL requests.
Impact Level : Application
Solution
Ensure the latest engine is installed by using the built-in update mechanism and for Host-Based Intrusion Prevention System, https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=RO00535&actionID=4 ftp://ftp.ca.com/CAproducts/unicenter/CAHIPS/nt/0703/RO00535/RO00535.CAZ
Insight
Multiple flaw are due to insufficient verification/validation of IOCTL requests by the kmxfw.sys driver.
Affected
CA Internet Security Suite 2007 (v3.2) with CA Personal Firewall 2007 (v9.1) Engine version 1.2.260 and below
CA Internet Security Suite 2008 (v4.0) with CA Personal Firewall 2008 (v10.0) Engine version 1.2.260 and below
CA Personal Firewall 2007 (v9.1) with Engine version 1.2.260 and below CA Personal Firewall 2008 (v10.0) with Engine version 1.2.260 and below CA Host-Based Intrusion Prevention System r8
References
- http://seclists.org/fulldisclosure/2008/Aug/0256.html
- http://securitytracker.com/alerts/2008/Aug/1020662.html
- http://securitytracker.com/alerts/2008/Aug/1020663.html
- http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36559
- http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36560
- http://www.securityfocus.com/archive/1/archive/1/495397/100/0/threaded
- http://www.trapkit.de/advisories/TKADV2008-006.txt
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-2926 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities