First published: Thu Mar 24 2016(Updated: )
The non-Domino web agents in CA Single Sign-On (aka SSO, formerly SiteMinder) R6, R12.0 before SP3 CR13, R12.0J before SP3 CR1.2, and R12.5 before CR5 allow remote attackers to cause a denial of service (daemon crash) or obtain sensitive information via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Single Sign-on | =r6.0 | |
Broadcom Single Sign-on | =r12.0 | |
Broadcom Single Sign-on | =r12.0j | |
Broadcom Single Sign-on | =r12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6854 is considered to have a high severity due to its potential for causing a denial of service and exposing sensitive information.
To fix CVE-2015-6854, upgrade to the latest service pack for CA Single Sign-On, specifically SP3 CR13 for R12.0 and corresponding updates for R6.0 and R12.5.
CVE-2015-6854 affects CA Single Sign-On versions R6.0, R12.0 before SP3 CR13, R12.0J before SP3 CR1.2, and R12.5 before CR5.
CVE-2015-6854 allows remote attackers to launch denial-of-service attacks resulting in daemon crashes or to retrieve sensitive information via crafted requests.
Yes, CVE-2015-6854 was publicly disclosed in 2016, highlighting its vulnerabilities in CA Single Sign-On.