Back to list
[CAID 34616, 34617, 34618]: CA eSCC and eTrust Audit vulnerabilities
Sep 21 2006 03:15PM
Williams, James K (James Williams ca com)
Title: CAID 34616, 34617, 34618: CA eTrust Security Command Center
and eTrust Audit vulnerabilities
CA Vulnerability ID (CAID): 34616, 34617, 34618
CA Advisory Date: 2006-09-20
Patrick Webster of aushack.com
Impact: Remote attacker can read/delete files, or potentially
execute replay attacks.
Summary: CA eTrust Security Command Center (eSCC) and eTrust Audit
contain multiple remotely exploitable vulnerabilities.
o The first vulnerability allows attackers to discover the web
server path on Windows platforms. This vulnerability affects
eTrust Security Command Center Server component versions 1.0,
r8, r8 SP1 CR1, and r8 SP1 CR2.
o The second vulnerability allows attackers to read and delete
arbitrary files from the host server with permissions of the
service account. This vulnerability affects eTrust Security
Command Center Server component versions r8, r8 SP1 CR1, and
r8 SP1 CR2.
o The third vulnerability allows attackers to potentially execute
external replay attacks. To mitigate this vulnerability, users
should utilize perimeter firewalls to block access to the event
system. This vulnerability affects eTrust Security Command
Center Server component versions 1.0, r8, r8 SP1 CR1, and
r8 SP1 CR2, and eTrust Audit versions 1.5 and r8.
Mitigating Factors: Attacker must have valid authentication
credentials to read or delete files, as described in the second
Severity: CA has given this vulnerability a Medium risk rating.
CA eTrust Security Command Center 1.0
CA eTrust Security Command Center r8
CA eTrust Security Command Center r8 SP1 CR1
CA eTrust Security Command Center r8 SP1 CR2
CA eTrust Audit 1.5
CA eTrust Audit r8
Status and Recommendation:
Apply the appropriate patch to eTrust Security Command Center to
address the first and second vulnerabilities described above.
Patch URL (note that URL may wrap):
For the third vulnerability, utilize perimeter firewalls to block
access to the event system.
Determining if you are affected:
Check the registry version key.
\ComputerAssociates\eTrust Security Command Center
Look for Version key:
Version 1.0.15 (eTrust Security Command Center 1.0)
Version 8.0.11 (eTrust Security Command Center r8)
Version 8.0.25 (eTrust Security Command Center r8 SP1 CR1)
Version 220.127.116.11 (eTrust Security Command Center r8 SP1 CR2)
References (URLs may wrap):
CA SupportConnect Security Notice for these vulnerabilities:
CAID: 34616, 34617, 34618
CAID Advisory link:
Discoverer (Patrick Webster from aushack.com):
CVE References: CVE-2006-4899, CVE-2006-4900, CVE-2006-4901
OSVDB References: OSVDB IDs: 29009, 29010, 29011
Changelog for this advisory:
v1.0 - Initial Release
Customers who require additional information should contact CA
Technical Support at http://supportconnect.ca.com.
For technical questions or comments related to this advisory,
please send email to vuln (at) ca (dot) com [email concealed], or contact me directly.
If you discover a vulnerability in CA products, please report
your findings to vuln (at) ca (dot) com [email concealed], or utilize our "Submit a
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research
CA, One Computer Associates Plaza. Islandia, NY 11749
Legal Notice http://www3.ca.com/legal/
Copyright (c) 2006 CA. All rights reserved.
[ reply ]
Copyright 2010, SecurityFocus