-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2010.0228
             CA20100304-01: Security Notice for CA SiteMinder
                               8 March 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           CA SiteMinder
Publisher:         CA
Operating System:  Windows
                   Red Hat
                   HP-UX
                   Solaris
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2009-3731  

Original Bulletin: 
   https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=230857

- --------------------------BEGIN INCLUDED TEXT--------------------

CA20100304-01: Security Notice for CA SiteMinder


Issued: March 04, 2010


CA's support is alerting customers to a security risk with CA 
SiteMinder. Multiple cross site scripting (XSS) vulnerabilities 
exist that can allow a remote attacker to potentially gain 
sensitive information. CA has provided guidance to remediate the 
vulnerability.

The vulnerabilities, CVE-2009-3731, are due to insufficient 
validation of input strings. An attacker can potentially steal 
network domain credentials by enticing a user to visit a web page 
that contains malicious content.


Risk Rating

Low


Platforms

Windows
Solaris
HP-UX
Red Hat Linux


Affected Products

CA SiteMinder 6.0 (SP4 and earlier)


How to determine if the installation is affected

The vulnerability is caused by an issue with the publishing tool 
used to create the online help and HTML documentation for older CA 
SiteMinder releases (6.0 SP4 and earlier). This vulnerability 
affects CA SiteMinder in the following ways:

 * HTML versions of the product documentation for SiteMinder can 
be deployed on an individual system or through a web server. If 
product documentation has been deployed on a web server the 
SiteMinder 6.0 installation is vulnerable.

 * Online help systems for SiteMinder are deployed and accessible 
through a web server. This vulnerability applies to help systems.

In both cases, this vulnerability applies if web access to the 
associated web servers has been configured to make use of 
non-public (client-specific) information.


Solution

CA SiteMinder:

 * Upgrade Policy Servers to the latest service pack for SiteMinder 
6.0. Remove older versions of the product documentation from your 
servers.

 or

 * For Integrated Document sets, if you have deployed the HTML 
version of documentation to a web server, move the documentation 
to a file server and delete the documentation from the web server.

 * For Online Help systems, remove the help systems from the 
application folders and place them on a file system for future 
reference. Note that this will cause help links to fail in the 
associated applications.

 The folders that contain help systems are:

   o Administrative UI Help:
     <policy server home>\admin\help

   o Policy Server Management Console Help:
     <policy server home>\bin\smconsole-help

   o SiteMinder Test Tool Help:
     <policy server home>\bin\smtest-help


References

CVE-2009-3731 - WebWorks Help XSS


Acknowledgement

CVE-2009-3731 - Daniel Grzelak and Alex Kouzemtchenko of stratsec 
(www.stratsec.net)


Change History

Version 1.0: Initial Release


If additional information is required, please contact CA Support 
at https://support.ca.com.

If you discover a vulnerability in CA products, please report your 
findings to the CA Product Vulnerability Response Team.
support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782



Regards,
Ken Williams, Director ; 0xE2941985
CA Product Vulnerability Response Team


CA, 1 CA Plaza, Islandia, NY 11749
	
Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2010 CA. All rights reserved.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFLlC5i/iFOrG6YcBERAlf4AJ9gQlPEZIrxWffnmO1QQGzRGCgLAwCgqCF8
wPnUAvaIDBUrA205ZunhDz8=
=yl/u
-----END PGP SIGNATURE-----