Issued: April 06, 2010
Updated: January 21, 2011
CA's support is alerting customers to multiple security risks with CA XOsoft products. Multiple vulnerabilities exist that can allow a remote attacker to gain sensitive information, cause a denial of service, or possibly execute arbitrary code. CA has issued patches to address the vulnerabilities.
The first vulnerability, CVE-2010-1221, occurs due to a lack of authentication. An attacker can make a SOAP request to enumerate user names. This vulnerability has a low risk rating and affects r12.0 and r12.5 XOsoft products.
The second vulnerability, CVE-2010-1222, occurs due to a lack of authentication. An attacker can make a SOAP request to gain potentially sensitive information. This vulnerability has a low risk rating and affects only r12.5 XOsoft products.
The third set of vulnerabilities, CVE-2010-1223, occurs due to insufficient bounds checking. An attacker can make a request that can cause a buffer overflow which may result in a crash or possibly code execution. These vulnerabilities have a high risk rating and affect r12.0 and r12.5 XOsoft products.
CA XOsoft Replication r12.5
CA XOsoft High Availability r12.5
CA XOsoft Content Distribution r12.5
CA XOsoft Replication r12.0
CA XOsoft High Availability r12.0
CA XOsoft Content Distribution r12.0
CA XOsoft Replication r4
CA XOsoft High Availability r4
CA XOsoft Content Distribution r4
How to determine if the installation is affected
|Product||File Name||File Version|
|XOsoft 12.5 SP1||mng_core_com.dll||18.104.22.1686|
|XOsoft 12.5 products||mng_core_com.dll||22.214.171.1243|
|XOsoft 12.0 products||mng_core_com.dll||126.96.36.199|
CA issued the following patches to address the vulnerabilities.
CA XOsoft Replication r12.5,
CA XOsoft High Availability r12.5,
CA XOsoft Content Distribution r12.5:
CA XOsoft Replication r12.0,
CA XOsoft High Availability r12.0,
CA XOsoft Content Distribution r12.0:
CVE-2010-1221, CVE-2010-1222, CVE-2010-1223 - Andrea Micalizzi aka rgod reported through the TippingPoint ZDI program.
Version 1.0: Initial Release
Version 1.1: Replaced 12.5 RO15016 and 12.0 RO16643 patches with RO17180 and RO17181 respectively due to minor packaging issues.
If additional information is required, please contact CA Support at https://support.ca.com.
If you discover a vulnerability in CA products, please report your findings to the CA Product Vulnerability Response Team.