Программа:
BrightStor ARCserve Backup 11.x
BrightStor ARCserve Backup 9.x
BrightStor Enterprise Backup 10.x
BrightStor Storage Command Center 11.x
BrightStor Storage Resource Manager 11.x
CA Advantage Data Transformer 2.x
CA AllFusion Enterprise Workbench 1.x
CA AllFusion Enterprise Workbench 7.x
CA AllFusion Harvest Change Manager 7.x
CA ARCserve Backup for Laptops & Desktops 11.x
CA CleverPath Aion 10.x
CA CleverPath Predictive Analysis Server 3.x
CA Embedded Entitlements Manager 8.x
CA eTrust Admin 8.x
CA eTrust Audit 8.x
CA Network Forensics 8.x
CA Unicenter Advanced Systems Management 11.x
CA Unicenter Asset Intelligence 11.x
CA Unicenter Asset Management 11.x
CA Unicenter Asset Portfolio Management 11.x
CA Unicenter Database Command Center 11.x
CA Unicenter Desktop and Server Management 11.x
CA Unicenter Desktop Management Suite 11.x
CA Unicenter Enterprise Job Manager 1.x
CA Unicenter Job Management Option 11.x
CA Unicenter Lightweight Portal 2.x
CA Unicenter Management Portal 3.x
CA Unicenter Network and Systems Management (NSM) 11.x
CA Unicenter Network and Systems Management (NSM) 3.x
CA Unicenter Patch Management 11.x
CA Unicenter Remote Control 11.x
CA Unicenter Remote Control 6.x
CA Unicenter Service Accounting 11.x
CA Unicenter Service Assure 11.x
CA Unicenter Service Assure 2.x
CA Unicenter Service Catalog 11.x
CA Unicenter Service Delivery 11.x
CA Unicenter Service Intelligence 11.x
CA Unicenter Service Metric Analysis 11.x
CA Unicenter Service Metric Analysis 3.x
CA Unicenter ServicePlus Service Desk 11.x
CA Unicenter ServicePlus Service Desk 5.x
CA Unicenter ServicePlus Service Desk 6.x
CA Unicenter Software Delivery 11.x
CA Unicenter TNG 2.x
CA Unicenter Web Services Distributed Management 3.x
CA Unicenter Workload Control Center 1.x
CA Wily SOA Manager 7.x
eTrust Directory 8.x
eTrust IAM Suite 8.x
eTrust Identity Manager 8.x
eTrust Secure Content Manager (SCM)
eTrust Single Sign-On 7.x
eTrust Web Access Control 1.x
Уязвимость позволяет удаленному злоумышленнику обойти ограничения безопасности на целевой системе. Уязвимость существует из-за ошибки в проверке входных данных в компоненте Ingres 2.x. Атакующий, может подсоединиться к Ingres с данными аутентификации другого пользователя, подсоединившегося перед злоумышленником. Эксплуатирование уязвимости приведет к обходу механизма аутентификации на целевой системе.