Computer Associates has reported an unpatched flaw in its iGateway security software, which allows remote attackers to take over a system and execute arbitrary code.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
CA says the vulnerability is due to improper bounds checking of HTTP GET requests by iGateway, when the debug mode is enabled.
Remote attackers can exploit this vulnerability to cause a buffer overflow and execute arbitrary code.
The vulnerability exists in versions of 3.0 and 4.0 of iGateway supplied before 23 June 2005.
IGateway is shipped with products such as BrightStor ARCserve 2000, BrightStor Enterprise Backup and BrightStor Portal. The debug mode is not enabled by default however.
CA has not provided a fix to the problem so far, but recommends that users do not use the debug mode. CA has judged the overall risk as “medium” with the impact being “critical”.