BugTraq
[CAID 35970]: CA Products That Embed Ingres Authentication Vulnerability Dec 21 2007 07:26PM
Williams, James K (James Williams ca com)


Title: [CAID 35970]: CA Products That Embed Ingres Authentication

Vulnerability

CA Vuln ID (CAID): 35970

CA Advisory Date: 2007-12-19

Reported By: Ingres Corporation

Impact: Attacker can gain elevated privileges.

Summary: A potential vulnerability exists in the Ingres software

that is embedded in various CA products. This vulnerability exists

only on Ingres 2.5 and Ingres 2.6 on Windows, and does not

manifest itself on any Unix platform. Ingres r3 and Ingres 2006

are not affected. The vulnerability, CVE-2007-6334, is associated

with users who connect after the first user being assigned the

privileges and identity of the first user. In all reported

instances, the application (typically an ASP.NET application using

the Ingres ODBC driver) was running on Microsoft IIS Web server,

and with the Integrated Windows Authentication (IWA) option

enabled. While IWA is not enabled by default, it is a commonly

used option. It should be noted that the Ingres .NET data provider

is not affected.

Mitigating Factors: The vulnerability exists only on Windows

systems running Microsoft IIS Web server that have the Integrated

Windows Authentication (IWA) option enabled.

Severity: CA has given this vulnerability a High risk rating.

Affected Products:

All CA products that embed Ingres 2.5 and Ingres 2.6, and also run

Microsoft IIS Web server with the Integrated Windows

Authentication (IWA) option enabled.

Affected Platforms:

Windows

Status and Recommendation (URLs may wrap):

Ingres has issued the following patches to address the

vulnerabilities.

Ingres 2.6 Single-Byte patch - Ingres 2.6 Single-Byte patch

ftp://ftp.ca.com/caproducts/ips/MDB/Generic_Ingres/IIS_Vulnerability/pat
ch-2.6.0701.12467-win-x86.zip

Ingres 2.6 Double-Byte patch- Ingres 2.6 Double-Byte patch

ftp://ftp.ca.com/caproducts/ips/MDB/Generic_Ingres/IIS_Vulnerability/pat
ch-2.6.0701.12473-win-x86-DBL.zip

Ingres 2.5 Single Byte Patch- Ingres 2.5 Single Byte patch

ftp://ftp.ca.com/caproducts/ips/MDB/Generic_Ingres/IIS_Vulnerability/pat
ch-2.5.0605.12291-win-x86.zip

Potential problems installing the patches:

While testing these patches, CA identified an install issue when

the user is presented with the option to make a backup of the

Ingres installation. In cases where a <space> is in the path, the

path is not properly read. The backup does get taken and is by

default stored in the %II_SYSTEM%\ingres\install\backup directory.

Additionally, if the user happens to press the "Set Directory"

button, the path will be displayed. Clicking "ok" will result in a

message stating "... spaces are not supported in paths... ". This

also is an error; pressing cancel will return the user to the

first screen with the default path, and while the displayed path

is terminated at a space, the actual path does work. To avoid this

issue, use DOS 8.3 definitions (ex. C:\progra~1\CA\ingres).

How to determine if you are affected:

Check the %II_SYSTEM%\ingres\version.rel file to identify the

Ingres version. If the installed version of Ingres 2.6 is a

Double-Byte version (should have DBL referenced), please download

the 2.6 Double-Byte patch. Otherwise, use the Single-Byte patch.

Workaround: None

References (URLs may wrap):

CA SupportConnect:

http://supportconnect.ca.com/

Important Security Notice for Customers Using Products that Embed

Ingres on Microsoft Windows ONLY

http://supportconnectw.ca.com/public/ingres/infodocs/ingresmswin-secnot.
asp

Solution Document Reference APARs:

N/A

CA Security Response Blog posting:

CA Products That Embed Ingres Authentication Vulnerability

http://community.ca.com/blogs/casecurityresponseblog/archive/2007/12/19.
aspx

CA Vuln ID (CAID): 35970

http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35970

Reported By:

Ingres Corporation

http://ingres.com/support/security.php

http://ingres.com/support/security-alertDec17.php

CVE References: CVE-2007-6334

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6334

OSVDB References: 39358

http://osvdb.org/39358

Changelog for this advisory:

v1.0 - Initial Release

Customers who require additional information should contact CA

Technical Support at http://supportconnect.ca.com.

For technical questions or comments related to this advisory,

please send email to vuln AT ca DOT com.

If you discover a vulnerability in CA products, please report your

findings to vuln AT ca DOT com, or utilize our "Submit a

Vulnerability" form.

URL: http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx

Regards,

Ken Williams ; 0xE2941985

Director, CA Vulnerability Research

CA, 1 CA Plaza, Islandia, NY 11749

Contact http://www.ca.com/us/contact/

Legal Notice http://www.ca.com/us/legal/

Privacy Policy http://www.ca.com/us/privacy/

Copyright (c) 2007 CA. All rights reserved.

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus