CVE-2011-1036
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/02/2011
Last modified:
11/04/2025
Description
The XML Security Database Parser class in the XMLSecDB ActiveX control in the HIPSEngine component in the Management Server before 8.1.0.88, and the client before 1.6.450, in CA Host-Based Intrusion Prevention System (HIPS) 8.1, as used in CA Internet Security Suite (ISS) 2010, allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via vectors involving the SetXml and Save methods.
Impact
Base Score 2.0
8.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ca:host-based_intrusion_prevention_system:8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ca:internet_security_suite_2010:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ca:internet_security_suite_2011:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/43377
- http://secunia.com/advisories/43490
- http://securityreason.com/securityalert/8106
- http://www.securityfocus.com/archive/1/516649/100/0/threaded
- http://www.securityfocus.com/archive/1/516687/100/0/threaded
- http://www.securityfocus.com/bid/46539
- http://www.securitytracker.com/id?1025120=
- http://www.vupen.com/english/advisories/2011/0496
- http://www.zerodayinitiative.com/advisories/ZDI-11-093
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65632
- https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7B53A608DF-BFDB-4AB3-A98F-E4BB6BC7A2F4%7D
- http://secunia.com/advisories/43377
- http://secunia.com/advisories/43490
- http://securityreason.com/securityalert/8106
- http://www.securityfocus.com/archive/1/516649/100/0/threaded
- http://www.securityfocus.com/archive/1/516687/100/0/threaded
- http://www.securityfocus.com/bid/46539
- http://www.securitytracker.com/id?1025120=
- http://www.vupen.com/english/advisories/2011/0496
- http://www.zerodayinitiative.com/advisories/ZDI-11-093
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65632
- https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7B53A608DF-BFDB-4AB3-A98F-E4BB6BC7A2F4%7D



