Home page logo
/

Vulnwatch mailing list archives

Immunity Advisory: Computer Associates Unicenter TNG
From: Chris Wysopal <weld () vulnwatch org>
Date: Mon, 15 Mar 2004 11:18:51 -0500 (EST)


Excerpt:

Remote, unauthenticated stack overflow Computer Associates Unicenter TNG
Utilities awservices.exe

Computer Associates has developed a suite of tools that help enterprises
manage the software on their machines. In doing so, they developed several
proprietary protocols, which are implemented in various daemons, listening
on TCP and UDP ports, and running as SYSTEM. These daemons are vulnerable
to classic stack overflows. In particular, Immunity reviewed cam.exe and
awservices.exe, and found many examples of exploitable problems in both.
These are considered critical problems, as they are often installed on
every machine in an enterprise.

Full Advisory:

http://www.immunitysec.com/downloads/awservices.sxw.pdf


  By Date           By Thread  

Current thread:
  • Immunity Advisory: Computer Associates Unicenter TNG Chris Wysopal (Mar 15)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]