First published: Fri Apr 15 2011(Updated: )
The management.asmx module in the Management Web Service in the Unified Network Control (UNC) Server in CA Total Defense (TD) r12 before SE2 sends a cleartext response to unspecified getDBConfigSettings requests, which makes it easier for remote attackers to obtain database credentials, and subsequently execute arbitrary code, by sniffing the network, related to the UNCWS Web Service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Total Defense | =r12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1655 is considered to have a high severity due to the potential exposure of sensitive database credentials.
To fix CVE-2011-1655, update CA Total Defense to version r12 SE2 or later which addresses the vulnerability.
CVE-2011-1655 affects the management.asmx module in the Management Web Service of CA Total Defense r12 prior to SE2.
CVE-2011-1655 enables remote attackers to potentially obtain database credentials through unencrypted responses.
CVE-2011-1655 was published in April 2011.