---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: CA Secure Content Manager Multiple Vulnerabilities SECUNIA ADVISORY ID: SA30518 VERIFY ADVISORY: http://secunia.com/advisories/30518/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: eTrust Secure Content Manager (SCM) http://secunia.com/product/3391/ DESCRIPTION: Some vulnerabilities have been reported in CA eTrust Content Manager, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. The vulnerabilities are caused due to boundary errors when processing certain FTP requests and can be exploited to cause e.g. stack-based buffer overflows. Successful exploitation allows execution of arbitrary code. The vulnerabilities are reported in CA eTrust Secure Content Manager 8.0. SOLUTION: Apply patch QO99987 (please see the vendor's advisory for details): https://support.ca.com/irj/portal/anonymous/redirArticles?reqPage=search&searchID=QO99987 PROVIDED AND/OR DISCOVERED BY: The vendor credits Sebastian Apelt and Cody Pierce. ORIGINAL ADVISORY: http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36408 https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=QO99987&os=NT&actionID=3 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------