Vulnerability Name: | CVE-2011-0758 | ||||||||
Assigned: | 2011-02-10 | ||||||||
Published: | 2011-02-10 | ||||||||
Updated: | 2018-10-09 | ||||||||
Summary: | The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-189 | ||||||||
References: | Source: MITRE Type: CNA CVE-2011-0758 Source: MISC Type: UNKNOWN http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca Source: OSVDB Type: UNKNOWN 70840 Source: SECUNIA Type: Vendor Advisory 43200 Source: SREASON Type: UNKNOWN 8075 Source: BUGTRAQ Type: UNKNOWN 20110207 ZDI-11-059: CA ETrust Secure Content Manager Common Services Transport Remote Code Execution Vulnerability Source: BID Type: UNKNOWN 46253 Source: SECTRACK Type: UNKNOWN 1025052 Source: VUPEN Type: Vendor Advisory ADV-2011-0306 Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-11-059 Source: CONFIRM Type: Broken Link https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={EE6F16E1-6E05-4890-A739-2B9F745C721F} | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |