lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <649CDCB56C88AA458EFF2CBF494B62040B96898B@USILMS12.ca.com>
Date: Thu, 21 Apr 2011 00:58:04 -0400
From: "Williams, James K" <James.Williams@...com>
To: <bugtraq@...urityfocus.com>
Subject: CA20110420-01: Security Notice for CA SiteMinder


CA20110420-01: Security Notice for CA SiteMinder


Issued:  April 20, 2011


CA Technologies support is alerting customers to a security risk 
associated with CA SiteMinder. A vulnerability exists that can allow a 
malicious user to impersonate another user.  CA Technologies has 
issued patches to address the vulnerability.

The vulnerability, CVE-2011-1718, is due to improper handling of 
multi-line headers. A malicious user can send specially crafted data 
to impersonate another user.


Risk Rating 

Medium


Platform 

Windows


Affected Products 

CA SiteMinder R6 Web Agents prior to R6 SP6 CR2
CA SiteMinder R12 Web Agents prior to R12 SP3 CR2


How to determine if the installation is affected 

Check the Web Agent log to obtain the installed release version. Note 
that the "webagent.log" file name is configurable by the SiteMinder 
administrator.


Solution

CA has issued patches to address the vulnerability.

CA SiteMinder R6:
Upgrade to R6 SP6 CR2 or later

CA SiteMinder R12: 
Upgrade to R12 SP3 CR2 or later

CR releases can be found on the CA SiteMinder Hotfix / Cumulative 
Release page:
(URL may wrap)
support.ca.com/irj/portal/anonymous/phpdocs?filePath=0/5262/5262_fixinde
x.html


References

CVE-2011-1718 - CA SiteMinder Multi-line Header Vulnerability


Acknowledgement

April King (april@...evils.org)


Change History

Version 1.0: Initial Release


If additional information is required, please contact CA Technologies 
Support at https://support.ca.com.

If you discover a vulnerability in a CA Technologies product, please 
report your findings to the CA Technologies Product Vulnerability 
Response Team.
support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ