lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAKTj95X8Kqs+=0C23RA4-TG=oZGMVV9xw1RQL4CQpnoYwYJP5w@mail.gmail.com>
Date: Fri, 20 Nov 2020 16:54:11 -0600
From: Ken Williams via Fulldisclosure <fulldisclosure@...lists.org>
To: fulldisclosure@...lists.org
Subject: [FD] CA20201116-01: Security Notice for CA Unified Infrastructure
	Management

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

CA20201116-01: Security Notice for CA Unified Infrastructure Management

Issued: November 16th, 2020
Last Updated: November 16th, 2020

CA Technologies, A Broadcom Company, is alerting customers to a
vulnerability in CA Unified Infrastructure Management. A vulnerability
exists that can allow a local attacker to elevate privileges. CA
published solutions to address this vulnerability and recommends that
all affected customers implement these solutions.

The vulnerability, CVE-2020-28421, occurs due to improper access
control.  A local attacker can potentially elevate privileges.


Risk Rating

CVE-2020-28421 - High


Platform(s)

Microsoft Windows


Affected Products

CA Unified Infrastructure Management 20.1
CA Unified Infrastructure Management 9.2.0
CA Unified Infrastructure Management 9.1.0
CA Unified Infrastructure Management 9.0.2
Note: older, unsupported versions may be affected


Affected Components

The applicable component is robot (also known as controller).
Affected robot versions:
before 7.97HF11
before 9.20HF20
before 9.20SHF20 (secure)
before 9.30HF4
before 9.30SHF4 (secure)


Non-Affected Products

CA Unified Infrastructure Management 20.3


Non-Affected Components

Non-affected robot versions:
7.97HF11 or later
9.20HF20 or later
9.20SHF20 (secure) or later
9.30HF4 or later
9.30SHF4 (secure) or later


How to determine if the installation is affected

Check for the controller version in Infrastructure Manager or Admin
Console.  If the version is lower than 7.97HF11 for UIM 9.0.2,
9.20HF20 or 9.20SHF20 for UIM 9.2.0, 9.30HF4 or 9.30SHF4 for UIM 20.1,
then it is affected.


Solution

CA Technologies published the following solutions to address the
vulnerabilities:

robot_update patches 7.97HF11 (or above), 9.20HF20 (or above) and
9.30HF4 (or above).

robot_update_secure patches 9.20SHF20 (or above) and 9.30SHF4 (or above).

Note: UIM 8.5.1 users must upgrade robot to 7.97HF11. UIM
9.1.0 users must upgrade robot to 9.20HF20 (or above).

Hotfixes are available at:
https://support.broadcom.com/external/content/release-announcements/CA-Unif
ied-Infrastructure-Management-Hotfix-Index/7233


References

CVE-2020-28421 – CA UIM improper access control privilege elevation


Acknowledgement

CVE-2020-28421 – Fabius Artrel


Change History

Version 1.0: 2020-11-16 - Initial Release


CA customers may receive product alerts and advisories by subscribing
to Proactive Notifications on the support site.

Customers who require additional information about this notice may
contact CA Technologies Support at https://support.broadcom.com/

To report a suspected vulnerability in a CA Technologies product,
please send a summary to the CA Technologies Product Vulnerability
Response Team at ca.psirt <AT> broadcom.com

Security Notices, PGP key, disclosure policy, and related guidance can
be found at:
https://support.broadcom.com/external/content/security-advisories/CA-Produc
t-Vulnerability-Response-Team-Contact-Information/1867


Regards,
Ken Williams
Vulnerability and Incident Response, CA PSIRT
https://techdocs.broadcom.com/ca-psirt
Broadcom | broadcom.com | Kansas City, Missouri, USA
ken.williams <AT> broadcom.com | ca.psirt <AT> broadcom.com


Copyright (c) 2020 Broadcom. All Rights Reserved. The term "Broadcom"
refers to Broadcom Inc. and/or its subsidiaries. Broadcom, the pulse
logo, Connecting everything, CA Technologies and the CA technologies
logo are among the trademarks of Broadcom. All trademarks, trade names,
service marks and logos referenced herein belong to their respective
companies.

-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 15238)
Charset: utf-8

wsBVAwUBX7hE93DWZsOpNI4OAQiAcAgAqvsNL9t+DI5bO8q0/0vqjyqv/YHX66eU
NJx/MPaR0+iFZiNHr54KjD76+Pj+Fp4RsfCU0DNrk6DbrNp4K9wZFdinOLBVqg92
UoEjm5iGJwfiML2A1cL7+OSVU6eLJ7EuagbM4QKksLiCp4cqvZiEc8KrafGaw6Cg
8KSgcVz1uLtwH+Nek5D+fKwQkwNHnFFCINFniyy/nhVHZyKeUpxBa0h9Kjse1P2g
3bdcST3AzoasFWp8j/mGQ7qmzNtFCoUjNIG5wbksfrJdyJr1tILLpWaz2g7VXwL4
UYaBnRSrhsnkwdlX8VgP1Yq8ZGAzzI/7s+XAES14Ldhlh7M61SM0Vw==
=f9//
-----END PGP SIGNATURE-----

Download attachment "smime.p7s" of type "application/pkcs7-signature" (4168 bytes)


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ