First published: Wed Apr 07 2010(Updated: )
Multiple buffer overflows in CA XOsoft r12.0 and r12.5 allow remote attackers to execute arbitrary code via (1) a malformed request to the ws_man/xosoapapi.asmx SOAP endpoint or (2) a long string to the entry_point.aspx service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA XOsoft Content Distribution | =r12.0 | |
CA XOsoft Content Distribution | =r12.5 | |
CA XOsoft High Availability | =r12.0 | |
CA XOsoft High Availability | =r12.5 | |
Replicated Replicated Classic | =r12.0 | |
Replicated Replicated Classic | =r12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1223 is considered a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2010-1223, users should upgrade to the latest patched versions of CA XOsoft Replication and CA XOsoft High Availability.
CVE-2010-1223 can be exploited by sending a malformed request to the SOAP endpoint or a long string to the entry_point.aspx service.
The affected versions of CA XOsoft are r12.0 and r12.5 for both Replication and High Availability products.
Exploiting CVE-2010-1223 can lead to arbitrary code execution, potentially compromising the affected system.