This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Secure ACS UCP. The vulnerability is caused due to a boundary error within Cisco Secure ACS UCP when processing passwords with CSuserCGI.exe vulnerable module. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to this module.
An internal memory buffer may be overrun while handling long "MKD" commands. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the CesarFTP process. The CesarFTP server will be left inaccessible after successful exploitation.
The UNCWS Web Service component of CA Total Defense listens for SOAP requests. A remote unauthenticated attacker can invoke the getDBConfigSettings method, and the Web Service will answer with the server's database credentials. Once that the credentials are captured, it is possible for a remote attacker to connect to the database and execute arbitrary code under the context of the database administrator.