-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
Security Notice for CA Service Desk Manager
21 January 2019
AusCERT Security Bulletin Summary
Product: CA Service Desk Manager
Publisher: CA Technologies
Operating System: Linux variants
Impact/Access: Increased Privileges -- Existing Account
Access Confidential Data -- Remote/Unauthenticated
CVE Names: CVE-2018-19635 CVE-2018-19634
- --------------------------BEGIN INCLUDED TEXT--------------------
CA20190117-01: Security Notice for CA Service Desk Manager
Issued: January 17, 2019
Last Updated: January 17, 2019
CA Technologies Support is alerting customers to multiple potential
risks with CA Service Desk Manager. Multiple vulnerabilities exist
that can allow a remote attacker to access sensitive information or
possibly gain additional privileges. CA published solutions to
address the vulnerabilities.
The first vulnerability, CVE-2018-19634, is due to how survey access
is implemented. A malicious actor can access and submit survey
information without authentication.
The second vulnerability, CVE-2018-19635, allows for a malicious
actor to gain additional privileges.
CA Service Desk Manager 14.1
CA Service Desk Manager 17
How to determine if the installation is affected
CA Service Desk Manager r14.1:
Versions prior to 14.1.05.1 are vulnerable.
CA Service Desk Manager r17 Windows:
Versions 18.104.22.168 and prior without the 22.214.171.124 language patch in
the solution section are vulnerable
CA Service Desk Manager r17 Linux:
Versions prior to 126.96.36.199 are vulnerable
CA Technologies published the following solutions to address the
CA Service Desk Manager r14.1:
Update to CA Service Desk Manager 14.1.05.1. The rollup patches are
available on the CA Service Desk Manager 14.1 Solutions & Patches
Windows - SO05733
Sun - SO05716
Linux - SO05715
CA Service Desk Manager R17 Linux:
Update to 188.8.131.52 from the CA Service Desk Manager 17.1 Solutions
& Patches page.
CA Service Desk Manager R17 Windows:
Update to 184.108.40.206. Alternatively, update to 220.127.116.11 and install the
corresponding language patch for the Service Desk Manager
installation. All fixes are available on the CA Service Desk Manager
17.1 Solutions & Patches page.
Chinese - SO06055
English - SO06036
French - SO06051
French Canadian - SO06039
German - SO06037
Italian - SO06052
Japanese - SO06053
Portuguese - SO06054
Spanish - SO06038
CVE-2018-19634 - CA Service Desk Manager survey access
CVE-2018-19635 - CA Service Desk Manager privilege escalation
CVE-2018-19634 and CVE-2018-19635 - Bui Duy Hiep
Version 1.0: 2019-01-17 - Initial Release
CA customers may receive product alerts and advisories by subscribing
to Proactive Notifications.
Customers who require additional information about this notice may
contact CA Technologies Support at http://support.ca.com/.
To report a suspected vulnerability in a CA Technologies product,
please send a summary to CA Technologies Product Vulnerability
Response at vuln <AT> ca.com
Copyright 2019 Broadcom. All Rights Reserved. The term "Broadcom"
refers to Broadcom Inc. and/or its subsidiaries. Broadcom, the pulse
logo, Connecting everything, CA Technologies and the CA technologies
logo are among the trademarks of Broadcom. All trademarks, trade
names, service marks and logos referenced herein belong to their
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to firstname.lastname@example.org
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----