Exploit Targeting Corporate Computer Associates Users
An exploit specifically targeting corporate Computer Associates users has been created some three weeks after a critical vulnerability was identified.
The attack uses an ActiveX Control buffer overflow vulnerability present in 21 CA products, including BrightStor ARCServe Backup for Laptops and Desktops, Unicentre Remote Control, Software Delivery, Asset Management, Desktop Management Bundle and Desktop Management Suite. Buffer overflow error occurs in the ListCtrl.ocx ActiveX Control when handling overly long arguments passed to the “AddColumn()” method. This can be exploited by remote attackers to execute arbitrary code by tricking users into visiting a malicious webpage.
The exploit was rated as critical by the French Security Incident Response Team (FSIRT), which discovered the vulnerability, and allows hackers to launch local and remote attacks such as a denial-of-service (DoS) or a hijack of the affected system.
Attacks will probably become widespread because of the popularity of the exploit’s NeoSploit toolkit delivery system. The Neosploit toolkit is an advanced exploit framework which is used as Common Gateway Interface (CGI) script to deliver randomized executables through malicious Web sites. Exploit code is often obfuscated using custom JavaScript and the function name and local variables are randomized to avoid detection by Intrusion Detection Systems. Vulnerability found in CA products is likely to be quite widespread also because of CA’s size and spread within the corporate market.
As for this moment, CA has not commented on this issue but there will probably be an update or a patch in the near future.
More on CyberInsecure:
Leave a Reply
Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.