Short Name |
HTTP:INFO-LEAK:CA-TOTAL-DEFENSE |
---|---|
Severity |
Minor |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
CA Total Defense Suite UNCWS getDBConfigSettings Credential Information Disclosure |
Release Date |
2011/06/15 |
Update Number |
1939 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known information disclosure vulnerability in CA Total Defense Suite. Its due to insufficient access control when handling requests for the web service getDBConfigSettings. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.
Computer Associates Total Defense is prone to a remote code-execution vulnerability. Successfully exploiting this issue will allow attackers to execute arbitrary code with elevated privileges, completely compromising affected computers. Failed exploit attempts will likely crash the affected 'UNCWS' service. Total Defense r12 is vulnerable; other versions may also be affected.