Description:
Issue: A vulnerability has been identified with CA Directory, which can allow a remote attacker to cause a denial of service condition. The vulnerability, CVE-2011-3849, occurs due to insufficient bounds checking. An attacker can send a SNMP packet that can cause a crash.
Affected Products: CA Directory r12 SP1-SP7 and CA Directory 8.1
The vulnerability is related to CA Directory parsing of SNMP packets. To mitigate the risk, the SNMP port can be disabled by removing the "snmp-port" line from the DSA's knowledge configuration section. This is considered a workaround until the latest release of Single Sign-On server is certified with CA Directory r12.0 SP7 CR1 or later.
Solution:
On each of your SSO servers go to your knowledge folder. The default locations on Unix and Windows are below.
Edit ALL the dxc files starting with PS_Your_server_hostname.dxc and comment out the snmp-port line by putting a pound sign at the beginning of the line. You can also remove the line altogether.
Change to
Change to
See below example:
set dsa PS_SSO-SERVER = { prefix = <o "PS"> dsa-name = <o "PS"><cn PS_SSO-SERVER> dsa-password = "secret" address = tcp "sso-server.acme.com" port 13389 disp-psap = DISP cmip-psap = CMIP #snmp-port = 13389 console-port = 13379 ssld-port = 1112 auth-levels = anonymous, clear-password dsp-idle-time = 60 dsa-flags = multi-write trust-flags = allow-check-password, trust-conveyed-originator };
As always if you have any concerns or questions regarding the content provided in this technical document, please do not hesitate to open a case with CA Support Online.