Multiple CA products that utilize Alert service functionality contain multiple vulnerabilities. The vulnerabilities are due to insufficient bounds checking on received data by certain RPC procedures. An attacker can exploit these buffer overflows to execute arbitrary code or cause service failure.
dff03d4b04f6fb38db9efcc99d514db64917edf808004035f18a70b3cba857e0
iDefense Security Advisory 07.17.07 - Remote exploitation of multiple buffer overflow vulnerabilities in Computer Associates International Inc.'s (CA) Threat Manager allows attackers to execute arbitrary code with SYSTEM privileges. When Computer Associates Threat Manager is installed, it also installs the Alert Notification Server (alert.exe) which registers an RPC interface with the GUID 3d742890-397c-11cf-9bf1-00805f88cb72. This interface contains stack-based buffer overflow vulnerabilities within the handling code for several RPC operation codes. iDefense confirmed that the Alert Notification Server included with Computer Associates International Inc.'s eTrust Integrated Threat Management r8 for Windows is vulnerable.
45a5f1700f172a1a35fff01253f255fa6dcf41615e0701e84b3fafb7502a463f