CA Technologies support is alerting customers to a security risk associated with CA SiteMinder. A vulnerability exists that can allow a malicious user to impersonate another user. CA Technologies has issued patches to address the vulnerability. The vulnerability is due to improper handling of multi-line headers. A malicious user can send specially crafted data to impersonate another user.
54d353436068f5967916378335b32cc7d35d97264b19d01f20dab55f3ff1a995
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
CA20110420-01: Security Notice for CA SiteMinder
Issued: April 20, 2011
CA Technologies support is alerting customers to a security risk
associated with CA SiteMinder. A vulnerability exists that can allow a
malicious user to impersonate another user. CA Technologies has
issued patches to address the vulnerability.
The vulnerability, CVE-2011-1718, is due to improper handling of
multi-line headers. A malicious user can send specially crafted data
to impersonate another user.
Risk Rating
Medium
Platform
Windows
Affected Products
CA SiteMinder R6 Web Agents prior to R6 SP6 CR2
CA SiteMinder R12 Web Agents prior to R12 SP3 CR2
How to determine if the installation is affected
Check the Web Agent log to obtain the installed release version. Note
that the "webagent.log" file name is configurable by the SiteMinder
administrator.
Solution
CA has issued patches to address the vulnerability.
CA SiteMinder R6:
Upgrade to R6 SP6 CR2 or later
CA SiteMinder R12:
Upgrade to R12 SP3 CR2 or later
CR releases can be found on the CA SiteMinder Hotfix / Cumulative
Release page:
(URL may wrap)
support.ca.com/irj/portal/anonymous/phpdocs?filePath=0/5262/5262_fixinde
x.h
tml
References
CVE-2011-1718 - CA SiteMinder Multi-line Header Vulnerability
Acknowledgement
April King (april@twoevils.org)
Change History
Version 1.0: Initial Release
If additional information is required, please contact CA Technologies
Support at https://support.ca.com.
If you discover a vulnerability in a CA Technologies product, please
report your findings to the CA Technologies Product Vulnerability
Response Team.
support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.9.1 (Build 287)
Charset: utf-8
wj4DBQFNr6uXeSWR3+KUGYURAvcnAKCVdxdKNawQQC/M/wK9tDk5gD6jzQCTByZ/
X9MjXhbKg9eeMFDPXdrxlA==
=nwb+
-----END PGP SIGNATURE-----