AOH :: HP Unsorted C :: B06-2069.HTM

Caid 34013 - ca common services cairim on z/os lmp svc vulnerability



CAID 34013 - CA Common Services CAIRIM on z/OS LMP SVC vulnerability
CAID 34013 - CA Common Services CAIRIM on z/OS LMP SVC vulnerability




Title: CAID 34013 - CA Common Services CAIRIM on z/OS LMP SVC 
vulnerability

CA Vulnerability ID: 34013

CA Advisory Date: 2006-05-02

Discovered By: IBM Global Services


Impact: Local attacker can gain escalated privileges.


Summary: 
A potential vulnerability issue exists in our CAIRIM LMP 
solution for z/OS. CAIRIM is delivered as part of CA's z/OS Common 
Services, and the LMP component provides licensing services to 
many of CA's z/OS solutions. IBM Global Services discovered an 
integrity problem, which could be exploited by an expert user of a 
z/OS system that utilizes CA's CAIRIM LMP component. We worked 
with IBM Global Services to understand the nature of the problem 
and to make certain that the remedy we have now provided addresses 
the problem completely.

CA has confirmed the presence of this vulnerability and has 
developed a corrective update that provides comprehensive 
protection for our customers. Additional Quality Assurance testing 
has been completed and an official published solution has been 
made available as of 2006-05-02.

The vulnerability is an integrity exposure associated with the way 
the CAIRIM LMP SVC operates in conjunction with the legitimate SVC 
invoking code. An attacker can potentially utilize a problem state 
program to take advantage of this integrity exposure and obtain 
supervisor state, key 0. Once the attacker achieves supervisor 
state, key 0, he could possibly then update any system memory 
areas he chooses. An attacker can use a carefully crafted program 
in supervisor state to potentially compromise system security 
settings and gain unauthorized access to other system related 
resources. Although recently discovered, this exposure has been 
present in the CAIRIM LMP code since its inception.


Mitigating Factors: Attacker must have (access to) an account on 
the system.  Also, target system must be running CAIRIM LMP on a 
z/OS platform.


Severity: CA has given this vulnerability a Medium risk rating.


Affected Technologies: The LMP subcomponent of the CAIRIM v1.0
component in CA Common Services. 


Affected Products (CA z/OS Solutions that use CAIRIM LMP):

CA-11-MVS
CA-1-MVS
CA-24 X 7 FOR DB2 FOR MVS
CA-7/REPORT BALANCING-MVS
CA-7/SMART CONSOLE-MVS
CA-7-MVS
CA-ACF2-MVS
CA-ADS/ONLINE-MVS
CA-ADVANCED DATA COMPRESSION
CA-ADVANTAGE EDBC CLIENT
CA-ALLOCATE
CA-APAS/INSIGHT FOR MVS
CA-APCDDS-MVS
CA-ASM2-MVS
CA-ASTEX
CA-AUTOMATED CONVERSATION LANG
CA-BATCH PROCESSOR
CA-BIND ANALYZER
CA-BUNDL
CA-CA-NETMASTER
CA-CICSORT-MVS
CA-COBOLVISION/ANALYZER-MVS
CA-COMPILE
CA-COOL:GEN
CA-CORP TIE UNATTENDED MODE
CA-CORPORATE TIE
CA-CREWS FOR MVS
CA-CULPRIT
CA-DADS/PLUS-MVS
CA-DATA BASE
CA-DATA COMPRESSOR
CA-DATA NAVIGATOR
CA-DATA REFLECTOR FOR DB2
CA-DATACOM
CA-DATAMACS-MVS
CA-DATAQUERY-MVS
CA-DB ANALYZER FOR IMS
CA-DB COMPRESS FOR IMS
CA-DC MONITOR EXTENSIONS
CA-DELIVER
CA-DETECTOR
CA-DISK FOR OS/390
CA-DISPATCH-MVS
CA-DL1 ONLINE FOR IMS
CA-DUO-MVS
CA-DYNAM/TLMS-MVS
CA-EARL
CA-EASYTRIEVE PLUS
CA-EDBC
CA-EDP/AUDITOR-MVS
CA-ENDEVOR/MVS
CA-EXAMINE-MVS
CA-EXECUTION FACILITY
CA-EXTEND/DASD MVS
CA-EZTEST/CICS-MVS
CA-FAST
CA-FASTDASD
CA-FAVER FOR MVS
CA-FILE MASTER
CA-FILESAVE-MVS
CA-FIX/2000 FOR COBOL MVS
CA-GOVERNOR FACILITY
CA-HIGH PERFORMANCE
CA-HYPER-BUF FOR MVS
CA-ICMS-MVS
CA-IDEAL
CA-IDMS-MVS
CA-IMPACT/2000
CA-INDEX EXPERT
CA-INFO/MASTER
CA-INFOREFINER
CA-INFOTRANSPORT
CA-INSIGHT FOR DB2
CA-INTERTEST-MVS
CA-INVENTORY/2000 MVS
CA-JARS-MVS
CA-JCLCHECK-MVS
CA-JOBLOG MANAGEMENT & RETRIEV
CA-JOBTRAC
CA-LIBRARIAN
CA-LIBRARY OF ROUTINES
CA-LOG ANALYZER
CA-LOG COMPRESS
CA-LOOK
CA-LPD INTERFACE
CA-MAILBOX OPTION
CA-MASTERCAT MVS
CA-MAZDAMON-MVS
CA-MERGE/MODIFY
CA-MICS
CA-MINDOVER-MVS
CA-MULTI-IMAGE MANAGE MVS
CA-NETMAN-MVS
CA-NETMASTER
CA-NETSPY NETWORK PERFORMANCE
CA-NETWORKIT SOCKETVIEW
CA-NEUPERFORMANCE ADVISOR
CA-N-VISION VIEW OPTION
CA-OBJECT
CA-ONLINE QUERY-MVS
CA-ONLINEREORG
CA-OPERA-MVS
CA-OPS\MVS
CA-OPTIMIZER
CA-PACKAGE/IT
CA-PAN/APT
CA-PAN/LCM-CONFIG-MGR-MVS
CA-PAN/MERGE
CA-PAN/SQL (RDBII) FOR MVS
CA-PANAUDIT PLUS
CA-PANEXEC
CA-PANVALET
CA-PARTITION EXPERT
CA-PASS-THRU PRINTER SUPPORT
CA-PDSMAN
CA-PLAN ANALYZER
CA-PLATINUM REPOSITORY
CA-PLEU FOR MVS
CA-PMA/CHARGEBACK-MVS
CA-POINTER EDITOR FOR IMS
CA-PPS FOR XEROX
CA-PREVAIL/XP
CA-PROAUDIT-MVS
CA-PROBUILD-MVS
CA-PROEDIT/DB2-MVS
CA-PROGRAM MANAGEMENT OPTIMIZE
CA-PROOPTIMIZE
CA-PROSECURE-MVS
CA-QUERY ANALYZER
CA-QUICK COPY
CA-QUICK-FETCH MVS
CA-QUIKSERV FOR VSAM
CA-RAMIS MVS
CA-RANDOMIZER ANALYSIS PROGRAM
CA-RAPID REORG
CA-RAPS-MVS
CA-RC
CA-REALIA II
CA-RECOVERY ANALYZER
CA-REMOTE CONSOLE
CA-REPORT FACILITY
CA-REPOSITORY
CA-RI
CA-ROSCOE-MVS
CA-RSVP
CA-SCHEDULER-MVS
CA-SECONDARY INDEX
CA-SHAREOPTION/5-MVS
CA-SOLVE EPS-SPOOL CONVER CODE
CA-SOLVE:ACCESS
CA-SOLVE:CPT
CA-SOLVE:FTS
CA-SOLVE:LINK FOR DB2 (EDBS)
CA-SOLVE:NETMAIL
CA-SOLVE:OPERATIONS
CA-SOLVE:X.25
CA-SORT-MVS
CA-SPACEMAN FOR MVS
CA-SPOOL
CA-SQL EASE
CA-SRAM-MVS
CA-SUBSYSTEM ANALYZER
CA-SYMDUMP
CA-SYSLOG MANAGEMENT & RETRIEV
CA-SYSVIEW/E
CA-TCPACCESS
CA-TELEVIEW
CA-TELON
CA-TESTCOVERAGE/2000
CA-THREAD TERMINATOR
CA-TOP SECRET
CA-TPX
CA-TRANSPORT AGENT FOR MVS
CA-TSO/MON W/ONLINE FACILITY
CA-UNICENTER MANAGEMENT for WEBSPHERE MQ for z/OS
CA-UNICENTER TNG AGENT FOR DB2
CA-UNICENTER TNG AGENT-OS/390
CA-UNICENTER TNG CA-IDMS AGENT
CA-UNICENTER TNG CICS AGENT
CA-UNICENTER TNG MQ SERIES
CA-UNICN TNG OS/390 UNIX AGENT
CA-UNICTR NSM SY MNTR Z/OS&OS/390
CA-UNICTR PREFX RES-IMS/ZOS/S3
CA-VANTAGE
CA-VERIFY-MVS
CA-VIEW
CA-VISION
CA-VISUAL EXPRESS
CA-VMAN-MVS
CA-VSAMAID FOR MVS
CA-VTAPE VIRTUAL TAPE SYSTEM
CA-VTX
CA-XCOM FOR MVS


Affected platforms:
z/OS


Status and Recommendation: 
Customers are advised to apply PTF QO78541 as soon as possible to 
ensure that computing environments are properly protected.
(note that URLs in this advisory may wrap)
PTF QO78541:
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO7854 
1

Prerequisite Maintenance - Before applying the corrective patch 
for this vulnerability, the following CAIRIM PTF maintenance must 
already be applied:
QO66290
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO6629 
0
QO66300
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO6630 
0
QO75220 
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO7522 
0


Determining if you are affected:

You can verify the existence of CAIRIM LMP on your system by using 
the IPCS Findmod (FMOD) command to examine storage in your z/OS 
LPA:

   1. Access IPCS from within TSO/ISPF
   2. Issue the following IPCS commands:
      SETDEF ACTIVE
      FMOD CAIRIMC

If a valid address for CAIRIMC is displayed, then CAIRIM LMP has 
been installed on the system. If CAIRIMC is present the display 
will be comparable to:

   BLS18462I Symbol X'C3C4C5C9 C7C3F0F0 F2F4C040 40404040

   40404040 40404040 40404040 404040' is not valid - no

   definition stored

   BLS18016I AMODE(31) entry point CAIRIMC is at 0D5EB000



   CAIRIMC

   LIST 0D5EB000. ASID(X'0001') LENGTH(X'21A0') MODULE(Cairimc)

Note the 0D5EB000 address is given for CAIRIMC meaning that 
CAIRIM LMP is installed.

If CAIRIM LMP is not installed, the FMOD CAIRIMC display will be 
similar to this:

   BLS18462I Symbol X'C3C4C5C9 C7C3F0F0 F2F4C040 40404040

   40404040 40404040 40404040 404040' is not valid - no

   definition stored

   BLS18462I Symbol X'C3C4C5C9 C7C3F0F0 F2F3C040 40404040

   40404040 40404040

            40404040 404040' is not valid - no definition stored

   BLS18104I Symbol LPDECAIRIMC not found
          
   BLS18015I Entry point CAIRIMC not found

In this case note the "not found" clause.


References: 
CA SupportConnect:
http://supportconnect.ca.com/ 
Important Security Notice for CAIRIM LMP for z/OS
http://supportconnectw.ca.com/public/ca_common_docs/cairimsecurity-notic 
e.asp
Important Security Notice for CAIRIM LMP for z/OS Affected products
http://supportconnectw.ca.com/public/ca_common_docs/cairim-affprods.asp 

CAID: 34013
CAID Advisory link: 
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34013 

Other relevant CA links:
CA Common Services for z/OS
http://supportconnectw.ca.com/public/tngfwOS390/fw390ca90.asp 
PTF QO78541:
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO7854 
1
QO66290:
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO6629 
0
QO66300:
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO6630 
0
QO75220:
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO7522 
0

CVE Reference: Pending
http://cve.mitre.org/ 

OSVDB Reference: 
OSVDB-25234 http://osvdb.org/25234 


Changelog for this advisory:
v1.0 - Initial Release


Customers who require additional information should contact CA 
Technical Support at http://supportconnect.ca.com. 

For technical questions or comments related to this advisory,
please send email to vuln@ca.com, or contact me directly. 

If you discover a vulnerability in CA products, please report
your findings to vuln@ca.com, or utilize our "Submit a 
Vulnerability" form.
URL: http://www3.ca.com/securityadvisor/vulninfo/submit.aspx 


Regards,
Ken Williams ; 0xE2941985
Dir. of CA Vulnerability Research Team


CA, One Computer Associates Plaza. Islandia, NY 11749
=09
Contact http://www3.ca.com/contact/ 
Legal Notice http://ca.com/calegal.htm 
Privacy Policy http://www.ca.com/caprivacy.htm 
Copyright 2006 CA.  All rights reserved.

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.