CA reports unpatched security flaw


CA reports unpatched security flaw

Antony Savvas

Computer Associates has reported an unpatched flaw in its iGateway security software, which allows remote attackers to take over a system and execute arbitrary code.

CA says the vulnerability is due to improper bounds checking of HTTP GET requests by iGateway, when the debug mode is enabled.

Remote attackers can exploit this vulnerability to cause a buffer overflow and execute arbitrary code.

The vulnerability exists in versions of 3.0 and 4.0 of iGateway supplied before 23 June 2005.

IGateway is shipped with products such as BrightStor ARCserve 2000, BrightStor Enterprise Backup and BrightStor Portal. The debug mode is not enabled by default however.

CA has not provided a fix to the problem so far, but recommends that users do not use the debug mode. CA has judged the overall risk as “medium” with the impact being “critical”.


Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy