Vulnerabilidad en Unified Network Control (UNC) Server en CA Total Defense (CVE-2011-1653)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-89
Neutralización incorrecta de elementos especiales usados en un comando SQL (Inyección SQL)
Fecha de publicación:
18/04/2011
Última modificación:
11/04/2025
Descripción
Múltiples vulnerabilidades de inyección SQL en Unified Network Control (UNC) Server en CA Total Defense (TD) r12 antes de SE2, permite a atacantes remotos ejecutar comandos SQL de su elección a través de los procedimientos almacenados(1)UnAssignFunctionalRoles (2) UnassignAdminRoles, (3) DeleteFilter, (4) NonAssignedUserList, (5) DeleteReportLayout, (6) DeleteReports, y(7) RegenerateReport .<br />
Impacto
Puntuación base 2.0
10.00
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:broadcom:total_defense:r12:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/44097
- http://securityreason.com/securityalert/8403
- http://securitytracker.com/id?1025353=
- http://www.securityfocus.com/archive/1/517489/100/0/threaded
- http://www.securityfocus.com/archive/1/517490/100/0/threaded
- http://www.securityfocus.com/archive/1/517491/100/0/threaded
- http://www.securityfocus.com/archive/1/517493/100/0/threaded
- http://www.securityfocus.com/archive/1/517494/100/0/threaded
- http://www.securityfocus.com/archive/1/517496/100/0/threaded
- http://www.securityfocus.com/archive/1/517497/100/0/threaded
- http://www.securityfocus.com/archive/1/517498/100/0/threaded
- http://www.securityfocus.com/bid/47355
- http://www.vupen.com/english/advisories/2011/0977
- http://www.zerodayinitiative.com/advisories/ZDI-11-128/
- http://www.zerodayinitiative.com/advisories/ZDI-11-129/
- http://www.zerodayinitiative.com/advisories/ZDI-11-130/
- http://www.zerodayinitiative.com/advisories/ZDI-11-131/
- http://www.zerodayinitiative.com/advisories/ZDI-11-132/
- http://www.zerodayinitiative.com/advisories/ZDI-11-133/
- http://www.zerodayinitiative.com/advisories/ZDI-11-134/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66725
- https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BCD065CEC-AFE2-4D9D-8E0B-BE7F6E345866%7D
- http://secunia.com/advisories/44097
- http://securityreason.com/securityalert/8403
- http://securitytracker.com/id?1025353=
- http://www.securityfocus.com/archive/1/517489/100/0/threaded
- http://www.securityfocus.com/archive/1/517490/100/0/threaded
- http://www.securityfocus.com/archive/1/517491/100/0/threaded
- http://www.securityfocus.com/archive/1/517493/100/0/threaded
- http://www.securityfocus.com/archive/1/517494/100/0/threaded
- http://www.securityfocus.com/archive/1/517496/100/0/threaded
- http://www.securityfocus.com/archive/1/517497/100/0/threaded
- http://www.securityfocus.com/archive/1/517498/100/0/threaded
- http://www.securityfocus.com/bid/47355
- http://www.vupen.com/english/advisories/2011/0977
- http://www.zerodayinitiative.com/advisories/ZDI-11-128/
- http://www.zerodayinitiative.com/advisories/ZDI-11-129/
- http://www.zerodayinitiative.com/advisories/ZDI-11-130/
- http://www.zerodayinitiative.com/advisories/ZDI-11-131/
- http://www.zerodayinitiative.com/advisories/ZDI-11-132/
- http://www.zerodayinitiative.com/advisories/ZDI-11-133/
- http://www.zerodayinitiative.com/advisories/ZDI-11-134/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66725
- https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BCD065CEC-AFE2-4D9D-8E0B-BE7F6E345866%7D