First published: Fri Sep 22 2006(Updated: )
Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, and eTrust Audit 1.5 and r8, allows remote attackers to spoof alerts and conduct replay attacks by invoking eTSAPISend.exe with the desired arguments.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom eTrust Audit Client | =1.5-sp2 | |
Broadcom eTrust Audit Client | =1.5-sp3 | |
Broadcom eTrust Audit Client | =8.0 | |
Broadcom eTrust Audit Datatools | =1.5-sp2 | |
Broadcom eTrust Audit Datatools | =1.5-sp3 | |
Broadcom eTrust Audit Datatools | =8.0 | |
Broadcom eTrust Audit Policy Manager | =1.5-sp2 | |
Broadcom eTrust Audit Policy Manager | =1.5-sp3 | |
Broadcom eTrust Audit Policy Manager | =8.0 | |
Broadcom eTrust Security Command Center | =1.0 | |
Broadcom eTrust Security Command Center | =8 | |
Broadcom eTrust Security Command Center | =8-sp1 | |
Broadcom eTrust Security Command Center | =8-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4901 has been classified as a medium severity vulnerability due to its potential for remote attack.
To fix CVE-2006-4901, update your eTrust Security Command Center or eTrust Audit software to the latest version that addresses this vulnerability.
CVE-2006-4901 can facilitate alert spoofing and replay attacks through the manipulation of eTSAPISend.exe.
CVE-2006-4901 affects eTrust Security Command Center 1.0, r8 up to SP1 CR2, and eTrust Audit 1.5 and r8.
The vendor for CVE-2006-4901 is Broadcom, which provides the affected eTrust software products.