License Patches Are Now Available To Address Buffer Overflows
CA License Security Notice
Attention CA Customers:
License Patches Are Now Available To Address Buffer Overflows
Working closely with eEye Digital Security® and iDEFENSE, the
CA Technical Support team has resolved multiple vulnerability
issues recently discovered in the CA License software. Both
eEye and iDEFENSE have confirmed that these vulnerabilities
have been properly addressed. CA has made patches available
to any affected license users.
Buffer overflow conditions can potentially allow arbitrary
code to be executed remotely with local SYSTEM privileges.
This affects versions of the CA License software v1.53
through v1.61.8 on the specified platforms. Customers with
these vulnerable versions should upgrade to CA License 1.61.9
or higher. CA License patches that address these issues can
be downloaded from the link below.
http://supportconnectw.ca.com/public/reglic/downloads/licensepatch.asp#alp
CA strongly recommends the application of the appropriate CA
License patch.
Affected products:
The vulnerability exists if the CA License package version
on the system is between v1.53 and v1.61.8.
Affected platforms:
AIX, DEC, HP-UX, Linux Intel, Linux s/390, Solaris, Windows
and Apple Mac.
Determining CA License versions:
1. Obtain the CA License package version:
Windows: The CA license package version can be obtained by
checking the file version of lic98version.exe. Right click
on lic98version.exe, choose Properties, and then select the
Version tab.
Unix/Linux/Mac: Run lic98version from a command prompt to
print out the version number and/or write it to
lic98version.log.
OR
2. Obtain the version of the vulnerable file:
If the lic98version file does not exist on the system (which
may be the case with older versions of the license package),
check the version of the affected file itself:
Windows: Obtain the version of lic98rmt.exe by right-clicking
on the file, choosing Properties, and then selecting the
Version tab. The vulnerability exists if the version is
between 0.1.0.15 and 1.4.6.
Unix/Linux/Mac - Run strings licrmt | grep BUILD from a
Command prompt. The following string format will be returned:
"LICAGENT BUILD INFO = /x.x.x/Apr 16 2003/17:13:35", Where
x.x.x is the file version. The vulnerability exists if this
file version is between v1.0.15 thru v1.4.6.
Note the following default license install directories:
Windows: C:\CA_LIC or C:\Program Files\CA\SharedComponents\CA_LIC
Unix/Linux/Mac: /opt/CA/ca_lic or /opt/CA/SharedComponents/ca_lic
Should you require additional information, please contact
CA Technical Support at http://supportconnect.ca.com.
Select Language for translations of this advisory:
English: http://supportconnectw.ca.com/public/ca_common_docs/security_notice.asp
Deutsch: http://www.ca.com/de/support/security_notice.htm
Français: http://www.ca.com/france/notification_securite.htm
Español: http://www.ca.com/es/local/security_notice.htm
Japanese (日本語): http://www.casupport.jp/resources/info/050301security_notice.htm
Chinese (中文): http://www.ca.com.cn/press/releases/2005/03/security_notice.htm
Italiano: http://www.ca.com/it/security_notice.htm/
Português: http://www.ca.com/br/security_notice.htm
Computer Associates International, Inc. (CA).
One Computer Associates Plaza. Islandia, NY 11749
Contact Us http://ca.com/catalk.htm
Legal Notice http://ca.com/calegal.htm
Privacy Policy http://ca.com
© 2005 Computer Associates International, Inc.
All rights reserved
--
kw
Ken Williams ; Vulnerability Research
Computer Associates ; james.williams@xxxxxx
A9F9 44A6 B421 FF7D 4000 E6A9 7925 91DF E294 1985