Vulnwatch mailing list archives
Immunity Advisory: Computer Associates Unicenter TNG
From: Chris Wysopal <weld () vulnwatch org>
Date: Mon, 15 Mar 2004 11:18:51 -0500 (EST)
Excerpt: Remote, unauthenticated stack overflow Computer Associates Unicenter TNG Utilities awservices.exe Computer Associates has developed a suite of tools that help enterprises manage the software on their machines. In doing so, they developed several proprietary protocols, which are implemented in various daemons, listening on TCP and UDP ports, and running as SYSTEM. These daemons are vulnerable to classic stack overflows. In particular, Immunity reviewed cam.exe and awservices.exe, and found many examples of exploitable problems in both. These are considered critical problems, as they are often installed on every machine in an enterprise. Full Advisory: http://www.immunitysec.com/downloads/awservices.sxw.pdf
Current thread:
- Immunity Advisory: Computer Associates Unicenter TNG Chris Wysopal (Mar 15)