-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                          ESB-2008.0807 -- [Win]
      Two vulnerabilities in CA HIPS kmxfw.sys and CA HIPS kmxfw.sys
                              14 August 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              CA Host-Based Intrusion Prevention System r8
                      CA Internet Security Suite 2007
                      CA Internet Security Suite 2008
                      CA Personal Firewall 2007
                      CA Personal Firewall 2008
Publisher:            CA
Operating System:     Windows
Impact:               Denial of Service
                      Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
                      Existing Account
CVE Names:            CVE-2008-3174 CVE-2008-2926

Original Bulletin:  
  http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36560
  http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36559

Comment: This bulletin contains two (2) CA advisories.
         
         The execute arbitrary code/commands impact requires an existing
         account.

- --------------------------BEGIN INCLUDED TEXT--------------------

CA HIPS kmxfw.sys driver denial of service vulnerability

   Date Discovered: 
   11 Aug 2008

   Date Published: 
   12 Aug 2008

   Last Updated: 
   12 Aug 2008

Threat Assessment 

   Overall Risk:  Medium
   Popularity : Medium
   Impact:  High
   Simplicity:  Low

Characteristics

   Vulnerability ID:  36560
   Discovered By:  Elazar Broad

   Exploitable Locally:  Yes
   Exploitable Remotely:  Yes

   Impact:  An attacker can cause a denial of service condition.

   Root Cause:  Software Vulnerability
   Description 
   Recommendations 
   Affected Technologies 
   References 

Description

   CA HIPS contains a vulnerability that can allow an attacker to cause a
   denial of service condition. The vulnerability is due to insufficient
   validation by the kmxfw.sys driver. An attacker can exploit this
   vulnerability to cause a denial of service condition.

Recommendations

   ----------------------------------------------------------------------
   ---------
   For: CA Host-Based Intrusion Prevention System r8, CA Internet
   Security Suite 2007, CA Internet Security Suite 2008, CA Personal
   Firewall 2007, CA Personal Firewall 2008
   Please install the following updates :-
   CA Host-Based Intrusion Prevention System r8:-
   ==============================
   https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=RO00535&actionID=4
   CA Internet Security Suite r3, r4 and CA Personal Firewall 2007,
   2008:-
   =============================================
   - Ensure the latest engine is installed by using the built-in update
   mechanism.
   - CA Personal Firewall Engine 1.2.276 and later are not affected.
   - To ensure that the latest automatic update is installed on your
   computer, you can
   view the Help => About screen in their CA Personal Firewall product
   and confirm
   that the engine version number is 1.2.276 or higher.

Affected Technologies

   Computer Associates: CA Host-Based Intrusion Prevention System r8
   Computer Associates: CA Internet Security Suite 2007
   Computer Associates: CA Internet Security Suite 2008
   Computer Associates: CA Personal Firewall 2007
   Computer Associates: CA Personal Firewall 2008

References

   CA:contentID:182496
   Mitre CVE: CVE-2008-3174

Copyright 2008 CA



CA HIPS kmxfw.sys IOCTL requests arbitrary code execution vulnerability

   Date Discovered: 
   11 Aug 2008

   Date Published: 
   12 Aug 2008

   Last Updated: 
   12 Aug 2008

Threat Assessment 

   Overall Risk:  Medium
   Popularity : Medium
   Impact:  High
   Simplicity:  Low

Characteristics

   Vulnerability ID:  36559
   Discovered By:  Tobias Klein

   Exploitable Locally:  Yes
   Exploitable Remotely:  No

   Impact:  A local attacker can cause a system crash or potentially
   execute arbitrary code.

   Root Cause:  Software Vulnerability
   Description 
   Recommendations 
   Affected Technologies 
   References 

Description

   CA HIPS contains a vulnerability that can allow a local attacker to
   cause a system crash or potentially execute arbitrary code. The
   vulnerability is due insufficient verification of IOCTL requests by
   the kmxfw.sys driver. An attacker can send an IOCTL request to cause a
   system crash or potentially execute arbitrary code.

Recommendations

   ----------------------------------------------------------------------
   ---------
   For: CA Host-Based Intrusion Prevention System r8, CA Internet
   Security Suite 2007, CA Internet Security Suite 2008, CA Personal
   Firewall 2007, CA Personal Firewall 2008
   Please install the following updates :-
   CA Host-Based Intrusion Prevention System r8:-
   ==============================
   https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=RO00535&actionID=4
   CA Internet Security Suite r3, r4 and CA Personal Firewall 2007,
   2008:-
   =============================================
   - Ensure the latest engine is installed by using the built-in update
   mechanism.
   - CA Personal Firewall Engine 1.2.276 and later are not affected.
   - To ensure that the latest automatic update is installed on your
   computer, you can
   view the Help => About screen in their CA Personal Firewall product
   and confirm
   that the engine version number is 1.2.276 or higher.

Affected Technologies

   Computer Associates: CA Host-Based Intrusion Prevention System r8
   Computer Associates: CA Internet Security Suite 2007
   Computer Associates: CA Internet Security Suite 2008
   Computer Associates: CA Personal Firewall 2007
   Computer Associates: CA Personal Firewall 2008

References

   CA:contentID:182496
   Mitre CVE: CVE-2008-2926

Copyright 2008 CA

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSKO/Xyh9+71yA2DNAQKT1QP/QNbAajfG5sAHPAKN7pTP6ZSxGl1UrNGN
H7XyRfRGjeiS+1ulKDTqnIBamX9/pDMIGZuPW9TDupk+vq6RyjXDO+1S9gQmekLF
56kd97F9+X3sFb0zs0VBw4Li92z87FUht6hOFStuuE8//aNurg+KTtWfr3C3lV7V
QyCVACZ/tXQ=
=UlZ+
-----END PGP SIGNATURE-----