lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAK6eronXBr2muKoOUzJmJA1X58cKRN_RVOngcKT8PnZJT59v8g@mail.gmail.com>
Date: Fri, 20 Dec 2019 20:04:11 -0500
From: Kevin Kotas via Fulldisclosure <fulldisclosure@...lists.org>
To: fulldisclosure@...lists.org
Subject: [FD] CA20191218-01: Security Notice for CA Client Automation Agent
	for Windows

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

CA20191218-01: Security Notice for CA Client Automation Agent for
Windows

Issued: December 18, 2019
Last Updated: December 18, 2019

CA Technologies, A Broadcom Company, is alerting customers to a
potential risk with CA Client Automation agent on Windows. A
vulnerability exists that can allow a local attacker to gain
escalated privileges. CA published solutions to address the
vulnerability and recommends that all affected customers implement
the applicable solution.

The vulnerability, CVE-2019-19231, occurs due to insecure file
access by the agent services. A local attacker may exploit this
vulnerability to execute arbitrary commands with escalated
privileges on an installation of the Client Automation agent.

Risk Rating

High

Platform(s)

Windows

Affected Products

CA Client Automation 14.0, 14.1, 14.2, 14.3 Windows agent

Affected Component

CA Client Automation Agent for Windows

How to determine if the installation is affected

Only the CA Client Automation agent on Windows is vulnerable.
Customers may check the .his file for the presence of the fix.

Solution

CA Technologies published the following solutions to address the
vulnerabilities.

Agents for CA Client Automation R14, R14 SP1 (14.0, 14.1):
Update to CA Client Automation R14 SP2 or SP3 and apply the
appropriate fix for R14 SP2 or SP3.

Agents for CA Client Automation R14 SP2 (14.2):
SO11134

Agents for CA Client Automation R14 SP3 (14.3):
SO11210

References

CVE-2019-19231 - CA Client Automation Agent privilege escalation

Acknowledgement

CVE-2019-19231 - Andrew Hess

Change History

Version 1.0: 2019-12-18 - Initial Release

CA customers may receive product alerts and advisories by
subscribing to Proactive Notifications on the support site.

Customers who require additional information about this notice may
contact CA Technologies Support at https://casupport.broadcom.com/

To report a suspected vulnerability in a CA Technologies product,
please send a summary to CA Technologies Product Vulnerability
Response at ca.psirt <AT> broadcom.com

Security Notices, PGP key, and disclosure policy and guidance
https://techdocs.broadcom.com/ca-psirt

Kevin Kotas
CA Product Security Incident Response Team

Copyright 2019 Broadcom. All Rights Reserved. The term "Broadcom"
refers to Broadcom Inc. and/or its subsidiaries. Broadcom, the pulse
logo, Connecting everything, CA Technologies and the CA technologies
logo are among the trademarks of Broadcom. All trademarks, trade
names, service marks and logos referenced herein belong to their
respective companies.

-----BEGIN PGP SIGNATURE-----
Charset: utf-8

wsBVAwUBXf0b9LZ6yOO9o8STAQiRngf6A4NlGriQt6XvSPTmUSsNWYYrUGfWo2i4
gVQC0wyp8rmzwTh+Wq6/DCW7YoTqMSEefpRfTDONwGztBDvIm7Ag79IHYXNHn7Oh
kT4M8YnlfyOmCcntNLgAlZLlaZlaQceVKkKQdLFMANpuRvVK4XDF13ad9UKxsTJh
zKFJ0hFgv9OliSR7MFepz+SMxd+OCPIHhz46JfMee7C5hN4Gw4uM+gIs/PwPdFM4
sZmlADI+mUiyqu+Dv/h62O8nJ12voe6SK5AD+GO8qpl8YQT1oujEa6MCa56Rdei2
4m1EEQyoedw+3bjd67c+DTwBJJAcSPhibKvfAwyppXth9vMqMMZOIw==
=HhfF
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ