exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

eEye.CAlicense.txt

eEye.CAlicense.txt
Posted Mar 3, 2005
Authored by Barnaby Jack | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered multiple stack-based vulnerabilities within the licensing component that processes incoming network requests in the Computer Associates License Management software.

tags | advisory, vulnerability
SHA-256 | 5797432c9b96dca5b15d0492af228f5700c812e44f776bf9de0dc187869c5343

eEye.CAlicense.txt

Change Mirror Download
Computer Associates License Manager Remote Vulnerabilities

Release Date:
03/02/2005

Severity:
High (Remote Code Execution)

Vendor:
Computer Associates

Software Affected:
The vulnerability exists if the CA License package version on the system
is between v1.53 and v1.61.8.
This package is included in almost all Computer Associates products.

Affected Platforms:
AIX
DEC
HP-UX
Linux Intel
Linux s/390
Solaris
Windows
Apple Mac

Overview:
The Computer Associates License Management software is installed by
default with almost all of Computer Associates products. The Licensing
software allows for the remote management and tracking of software
licenses. eEye Digital Security has discovered multiple stack-based
vulnerabilities within the licensing component that processes incoming
network requests. The licensing protocol is text-based, and all of the
vulnerabilities arise due to incorrect handling of the incoming text
strings. Successful exploitation of these vulnerabilities will allow a
remote attacker to reliably execute code within the SYSTEM context.

Technical Description:
The vulnerabilities exist within the "LIC98RMT.EXE" component. This
executable listens on TCP ports 10203 and 10204.
The license manager accepts the following remote commands:

LOG1 *
GETOLF
GETCONFIG *
PUTOLF *
GCR *
GBR *
OLFCONFIRM *
GETSTATE
GETBACKUP *
GETLOG *
NEWOLF *
GETLOGD
GETSERVER *
exit

Each of the commands marked with an asterisk contain insecure calls,
which can lead to exploitable conditions. These insecure calls include
tokenizing functions where the functions run out of bounds of the static
buffer, sscanf calls with no width specifiers, inline string copies, and
multiple uses of sprintf with no bounds checking performed. For the
license manager to successfully process the data within a request, all
that is required after a command is the terminating ASCII string "<EOM>"
(minus the quotes). Each command takes a variety of parameters, and
most commands issue calls to insecure functions that can trigger
exploitable conditions. The simplest vulnerability to trigger, and the
most prevalent, lies within the routine that logs status and error
messages to the license communications log file. This logging routine
contains numerous insecure function calls, particularly a call to
vsprintf where user-defined data is copied into a fixed stack buffer.
The vulnerable logging function can be triggered in a multitude of ways;
the easiest is to simply issue an invalid request:

x [user buffer] <EOM>

The above request will trigger one of the many by-the-book stack based
buffer overflows that are riddled throughout this software.

Protection:
Retina Network Security Scanner has been updated to identify this
vulnerability.
Blink - End-Point Vulnerability Prevention - protects from this
vulnerability.

Vendor Status:
Computer Associates have released patches for these issues. The patches
are available at:
http://supportconnectw.ca.com/public/reglic/downloads/licensepatch.asp#a
lp

Credit:
Discovery: Barnaby Jack

Related Links:
Retina Network Security Scanner - Free 15 Day Trial
http://www.eeye.com/html/Products/Retina/index.html

Greetings:
The lads from down-under.

Copyright (c) 1998-2004 eEye Digital Security
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express
consent of eEye. If you wish to reprint the whole or any part of this
alert in any other medium excluding electronic medium, please e-mail
alert@eEye.com for permission.

Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties with regard to this information. In no event shall the
author be liable for any damages whatsoever arising out of or in
connection with the use or spread of this information. Any use of this
information is at the user's own risk.

Feedback
Please send suggestions, updates, and comments to:

eEye Digital Security
http://www.eEye.com
info@eEye.com
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close