Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:ACTIVEX:CA-ETRUST

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

CA eTrust Intrusion Detection CallCode ActiveX Exploit

Release Date

2007/08/27

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: CA eTrust Intrusion Detection CallCode ActiveX Exploit


This signature detects attempts to exploit a known vulnerability in CA eTrust Intrusion Detection CallCode. An attacker can create a malicious Web page containing dangerous ActiveX Calls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Extended Description

Computer Associates eTrust Intrusion Detection is prone to a remote code-execution vulnerability. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

Affected Products

  • Computer Associates eTrust Intrusion Detection 3.0.0
  • Computer Associates eTrust Intrusion Detection 3.0.0 SP 1

References

  • BugTraq: 25050
  • CVE: CVE-2007-3302
  • URL: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=568
  • URL: http://supportconnectw.ca.com/public/etrust/etrust_intrusion/infodocs/eid-callervilnsecnot.asp

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out