All the vulnerabilites related to broadcom - adviseit
cve-2005-2669
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 | x_refsource_MISC | |
http://www.osvdb.org/18917 | vdb-entry, x_refsource_OSVDB | |
http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp | x_refsource_CONFIRM | |
http://secunia.com/advisories/16513 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/14623 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2005/1482 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:01.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18917", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/18917" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16513" }, { "name": "14623", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14623" }, { "name": "ADV-2005-1482", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18917", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/18917" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16513" }, { "name": "14623", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14623" }, { "name": "ADV-2005-1482", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2669", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919", "refsource": "MISC", "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18917", "refsource": "OSVDB", "url": "http://www.osvdb.org/18917" }, { "name": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16513" }, { "name": "14623", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14623" }, { "name": "ADV-2005-1482", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1482" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2669", "datePublished": "2005-08-23T04:00:00", "dateReserved": "2005-08-23T00:00:00", "dateUpdated": "2024-08-07T22:45:01.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2668
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/14622 | vdb-entry, x_refsource_BID | |
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 | x_refsource_MISC | |
http://www.osvdb.org/18916 | vdb-entry, x_refsource_OSVDB | |
http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp | x_refsource_CONFIRM | |
http://secunia.com/advisories/16513 | third-party-advisory, x_refsource_SECUNIA | |
http://www.kb.cert.org/vuls/id/619988 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2005/1482 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:01.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "14622", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14622" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18916", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/18916" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16513" }, { "name": "VU#619988", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/619988" }, { "name": "ADV-2005-1482", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-09-08T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "14622", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14622" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18916", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/18916" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16513" }, { "name": "VU#619988", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/619988" }, { "name": "ADV-2005-1482", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "14622", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14622" }, { "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919", "refsource": "MISC", "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18916", "refsource": "OSVDB", "url": "http://www.osvdb.org/18916" }, { "name": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16513" }, { "name": "VU#619988", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/619988" }, { "name": "ADV-2005-1482", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1482" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2668", "datePublished": "2005-08-23T04:00:00", "dateReserved": "2005-08-23T00:00:00", "dateUpdated": "2024-08-07T22:45:01.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2667
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 | x_refsource_MISC | |
http://www.osvdb.org/18915 | vdb-entry, x_refsource_OSVDB | |
http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/14621 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/16513 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2005/1482 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:01.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18915", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/18915" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "14621", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14621" }, { "name": "16513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16513" }, { "name": "ADV-2005-1482", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows attackers to cause a denial of service via unknown vectors, aka the \"CAM TCP port vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18915", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/18915" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "14621", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14621" }, { "name": "16513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16513" }, { "name": "ADV-2005-1482", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2667", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows attackers to cause a denial of service via unknown vectors, aka the \"CAM TCP port vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919", "refsource": "MISC", "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18915", "refsource": "OSVDB", "url": "http://www.osvdb.org/18915" }, { "name": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "14621", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14621" }, { "name": "16513", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16513" }, { "name": "ADV-2005-1482", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1482" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2667", "datePublished": "2005-08-23T04:00:00", "dateReserved": "2005-08-23T00:00:00", "dateUpdated": "2024-08-07T22:45:01.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "27A14CFE-F64B-478F-938F-9BFABDC1519E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:adviseit:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C841D8C5-1D71-49C8-ACE0-EED420DA4BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "7F206D15-FF0D-400E-9727-5DA6C07B57EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9688C248-2815-4386-AF03-13B2F000BC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "EC489ECB-30FB-4067-BF23-A8614FE50CB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "7B328CD3-30B5-4C1F-9BC3-511E48E832EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA67A49C-688A-4B6E-8B90-BEC937FCEE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "076561DB-925A-41BA-A444-D4484FA87227", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E3FE1453-0ECA-459B-8F23-776DF90617D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "50055C0C-3B7E-452D-A5FC-C618D0CC61B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D1D4FBE7-1B60-49AE-B5CD-FA1783454D75", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE46A9BF-C703-4A90-98A4-0211E909DFC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C03E1D5A-61EC-4B9E-96B1-69015D9210F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "08594EFB-E04B-42E8-BE00-C3ACDB62BA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "42F4E5D9-52F6-4A60-95AD-B57101644039", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "DCD39CAF-7164-4E0E-874A-213A4CB57D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "C8B5DC7A-C8E1-4E7D-8B58-7063B2F7CBCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6256DDC-50D7-489F-A04D-763AC41E6711", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9AD68320-7B1C-4651-ADA3-FD6AB599D375", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9FDBE82-E553-4504-A347-9C181B9B59FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A600F40-3E4D-4976-B82B-D7005CC4605C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*", "matchCriteriaId": "3696554E-AC8B-4028-81EA-A5BF9D7026EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*", "matchCriteriaId": "AE772B0B-9B5A-4768-B3F5-D6195ACE90AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "358E054A-2298-486B-88A4-44AB6864904E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9EC742EE-03C6-4BDC-AEF8-03609D6498E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBFCD53C-9536-4A62-B5A5-DAA8FFCA611F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_management_portal:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "435570CC-A9E2-4B7C-BC6A-7AC45223ECC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_management_portal:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "562569CE-C9AD-4D8C-ACCE-CAC9FF0EF8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB83D7E3-D798-45C5-BCC5-805B56D87CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_performance_management:2.4:sp3:openvms:*:*:*:*:*", "matchCriteriaId": "B46E7F96-99DF-42BA-B6D9-B625AB973850", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "53C2C33D-8403-4C75-8A52-713393FE408F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D293FB82-D21B-4BDD-A511-B994B557032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "90FF8920-8E4E-4369-96A8-954ECC05D0A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "173467CF-3871-49BA-B54A-27BA492F8433", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6AE0157-B6C9-4112-A3A6-5B040B19D4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "B7D03F79-22E5-49A3-AB05-14F8EDB04D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BAB1CA3-B423-4656-9532-29D02917C2BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7352EEC1-8FA1-431F-9A92-B0AA8B17F2E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "52933E5F-06B7-45E2-B8E5-9B25351E67A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "8A5FFBD6-2820-43D6-B945-FBFD6F6CFD72", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E17048CC-F3C9-47BC-87DE-4D431BC7E1C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2799F9BF-4C19-4268-AE41-03E9D1994CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AA4FB17-296A-4D26-9491-B7C151C45235", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2C5704D-3337-4351-872B-AF987DC39BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF2305-24CF-48F7-841E-63400CF25B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "96FE3512-D29B-4392-8DF8-B3B3A1F521BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9798A112-CE4D-435D-B80D-E4A4C7209A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "541D4956-3E82-4FA7-B18A-37D383D987A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "E836C2F1-2E93-4D4B-B0C3-3264762B26BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "18F48B87-E943-4915-83D2-5F08BD6D1825", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B42FDB59-00C8-4D6A-B6F0-C880E9C3F1D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "3A07DB6F-666C-4D87-9F7A-B17BE7454E4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:3.5:*:websphere_mq:*:*:*:*:*", "matchCriteriaId": "0FE2A55B-A89D-470E-8E9E-4B1B0FB1C4C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*", "matchCriteriaId": "DA6C17EE-38A9-4E8E-92E3-14D57E4BB546", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "A4F96A84-A69D-4017-A27D-09C7B95BA696", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "7FAD2FF7-1878-49F7-8F44-4E7DC4471F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*", "matchCriteriaId": "62B98B62-F00C-4F3E-B891-18AD04A37725", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*", "matchCriteriaId": "15726391-DF79-4EDE-AE6E-9D7B7E0EB654", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "16C98B61-52A4-4A67-BABA-B83AF6C7851C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*", "matchCriteriaId": "24BF5923-42E7-403E-81F0-D3136C58ECE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors." } ], "id": "CVE-2005-2668", "lastModified": "2024-11-21T00:00:06.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-23T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/16513" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/619988" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/18916" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14622" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/16513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/619988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/18916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "27A14CFE-F64B-478F-938F-9BFABDC1519E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:adviseit:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C841D8C5-1D71-49C8-ACE0-EED420DA4BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "7F206D15-FF0D-400E-9727-5DA6C07B57EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9688C248-2815-4386-AF03-13B2F000BC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "EC489ECB-30FB-4067-BF23-A8614FE50CB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "7B328CD3-30B5-4C1F-9BC3-511E48E832EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA67A49C-688A-4B6E-8B90-BEC937FCEE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E3FE1453-0ECA-459B-8F23-776DF90617D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "50055C0C-3B7E-452D-A5FC-C618D0CC61B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE46A9BF-C703-4A90-98A4-0211E909DFC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "03BEA407-27D7-4C11-9BCC-0A8F770A792F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:2.04:*:*:*:*:*:*:*", "matchCriteriaId": "0B6EDD67-A634-4B51-AF3A-B487D9CADC53", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:2.07:*:*:*:*:*:*:*", "matchCriteriaId": "CC0F5C8A-8B04-4234-A42E-91487EA61EBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:2.09:*:*:*:*:*:*:*", "matchCriteriaId": "7E3A2662-1784-4067-97A7-9B0B99133302", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C03E1D5A-61EC-4B9E-96B1-69015D9210F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "08594EFB-E04B-42E8-BE00-C3ACDB62BA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:message_queuing:1.05:*:*:*:*:*:*:*", "matchCriteriaId": "838477BC-45EE-428A-BF76-1923F432E5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:message_queuing:1.07_build_220_13:*:*:*:*:*:*:*", "matchCriteriaId": "74AEF982-9F6A-4832-8F61-DE8EF289A1F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:message_queuing:1.11_build_29_13:*:*:*:*:*:*:*", "matchCriteriaId": "35ED5855-D342-4C42-9ACE-17AC97ECEB3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6256DDC-50D7-489F-A04D-763AC41E6711", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9AD68320-7B1C-4651-ADA3-FD6AB599D375", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9FDBE82-E553-4504-A347-9C181B9B59FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A600F40-3E4D-4976-B82B-D7005CC4605C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*", "matchCriteriaId": "3696554E-AC8B-4028-81EA-A5BF9D7026EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*", "matchCriteriaId": "AE772B0B-9B5A-4768-B3F5-D6195ACE90AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "358E054A-2298-486B-88A4-44AB6864904E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9EC742EE-03C6-4BDC-AEF8-03609D6498E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBFCD53C-9536-4A62-B5A5-DAA8FFCA611F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_performance_management:2.4:sp3:openvms:*:*:*:*:*", "matchCriteriaId": "B46E7F96-99DF-42BA-B6D9-B625AB973850", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "53C2C33D-8403-4C75-8A52-713393FE408F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D293FB82-D21B-4BDD-A511-B994B557032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "90FF8920-8E4E-4369-96A8-954ECC05D0A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "173467CF-3871-49BA-B54A-27BA492F8433", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6AE0157-B6C9-4112-A3A6-5B040B19D4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "B7D03F79-22E5-49A3-AB05-14F8EDB04D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BAB1CA3-B423-4656-9532-29D02917C2BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7352EEC1-8FA1-431F-9A92-B0AA8B17F2E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "52933E5F-06B7-45E2-B8E5-9B25351E67A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "8A5FFBD6-2820-43D6-B945-FBFD6F6CFD72", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E17048CC-F3C9-47BC-87DE-4D431BC7E1C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2799F9BF-4C19-4268-AE41-03E9D1994CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AA4FB17-296A-4D26-9491-B7C151C45235", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2C5704D-3337-4351-872B-AF987DC39BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF2305-24CF-48F7-841E-63400CF25B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "18F48B87-E943-4915-83D2-5F08BD6D1825", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B42FDB59-00C8-4D6A-B6F0-C880E9C3F1D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "3A07DB6F-666C-4D87-9F7A-B17BE7454E4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:3.5:*:websphere_mq:*:*:*:*:*", "matchCriteriaId": "0FE2A55B-A89D-470E-8E9E-4B1B0FB1C4C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*", "matchCriteriaId": "DA6C17EE-38A9-4E8E-92E3-14D57E4BB546", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "A4F96A84-A69D-4017-A27D-09C7B95BA696", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "7FAD2FF7-1878-49F7-8F44-4E7DC4471F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5:*:web_servers:*:*:*:*:*", "matchCriteriaId": "C1E3D8C0-4554-4DCE-A883-5B20E686C895", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*", "matchCriteriaId": "15726391-DF79-4EDE-AE6E-9D7B7E0EB654", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_nsm:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CD914D01-2432-47CD-B316-05A1F65B294D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_nsm:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "52BD85A7-5F9F-4230-ABF1-2076715128DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "16C98B61-52A4-4A67-BABA-B83AF6C7851C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*", "matchCriteriaId": "24BF5923-42E7-403E-81F0-D3136C58ECE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows attackers to cause a denial of service via unknown vectors, aka the \"CAM TCP port vulnerability.\"" } ], "id": "CVE-2005-2667", "lastModified": "2024-11-21T00:00:06.313", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-23T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/16513" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/18915" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14621" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/16513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/18915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14621" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "27A14CFE-F64B-478F-938F-9BFABDC1519E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:adviseit:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C841D8C5-1D71-49C8-ACE0-EED420DA4BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "7F206D15-FF0D-400E-9727-5DA6C07B57EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9688C248-2815-4386-AF03-13B2F000BC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "EC489ECB-30FB-4067-BF23-A8614FE50CB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "7B328CD3-30B5-4C1F-9BC3-511E48E832EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA67A49C-688A-4B6E-8B90-BEC937FCEE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "076561DB-925A-41BA-A444-D4484FA87227", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E3FE1453-0ECA-459B-8F23-776DF90617D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "50055C0C-3B7E-452D-A5FC-C618D0CC61B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D1D4FBE7-1B60-49AE-B5CD-FA1783454D75", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE46A9BF-C703-4A90-98A4-0211E909DFC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C03E1D5A-61EC-4B9E-96B1-69015D9210F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "08594EFB-E04B-42E8-BE00-C3ACDB62BA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "42F4E5D9-52F6-4A60-95AD-B57101644039", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "DCD39CAF-7164-4E0E-874A-213A4CB57D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "C8B5DC7A-C8E1-4E7D-8B58-7063B2F7CBCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6256DDC-50D7-489F-A04D-763AC41E6711", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9AD68320-7B1C-4651-ADA3-FD6AB599D375", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9FDBE82-E553-4504-A347-9C181B9B59FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A600F40-3E4D-4976-B82B-D7005CC4605C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*", "matchCriteriaId": "3696554E-AC8B-4028-81EA-A5BF9D7026EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*", "matchCriteriaId": "AE772B0B-9B5A-4768-B3F5-D6195ACE90AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "358E054A-2298-486B-88A4-44AB6864904E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9EC742EE-03C6-4BDC-AEF8-03609D6498E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBFCD53C-9536-4A62-B5A5-DAA8FFCA611F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_management_portal:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "435570CC-A9E2-4B7C-BC6A-7AC45223ECC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_management_portal:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "562569CE-C9AD-4D8C-ACCE-CAC9FF0EF8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB83D7E3-D798-45C5-BCC5-805B56D87CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_performance_management:2.4:sp3:openvms:*:*:*:*:*", "matchCriteriaId": "B46E7F96-99DF-42BA-B6D9-B625AB973850", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "53C2C33D-8403-4C75-8A52-713393FE408F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D293FB82-D21B-4BDD-A511-B994B557032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "90FF8920-8E4E-4369-96A8-954ECC05D0A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "173467CF-3871-49BA-B54A-27BA492F8433", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6AE0157-B6C9-4112-A3A6-5B040B19D4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "B7D03F79-22E5-49A3-AB05-14F8EDB04D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BAB1CA3-B423-4656-9532-29D02917C2BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7352EEC1-8FA1-431F-9A92-B0AA8B17F2E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "52933E5F-06B7-45E2-B8E5-9B25351E67A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "8A5FFBD6-2820-43D6-B945-FBFD6F6CFD72", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E17048CC-F3C9-47BC-87DE-4D431BC7E1C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2799F9BF-4C19-4268-AE41-03E9D1994CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AA4FB17-296A-4D26-9491-B7C151C45235", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2C5704D-3337-4351-872B-AF987DC39BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF2305-24CF-48F7-841E-63400CF25B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "96FE3512-D29B-4392-8DF8-B3B3A1F521BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9798A112-CE4D-435D-B80D-E4A4C7209A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "541D4956-3E82-4FA7-B18A-37D383D987A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "E836C2F1-2E93-4D4B-B0C3-3264762B26BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "18F48B87-E943-4915-83D2-5F08BD6D1825", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B42FDB59-00C8-4D6A-B6F0-C880E9C3F1D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "3A07DB6F-666C-4D87-9F7A-B17BE7454E4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:3.5:*:websphere_mq:*:*:*:*:*", "matchCriteriaId": "0FE2A55B-A89D-470E-8E9E-4B1B0FB1C4C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*", "matchCriteriaId": "DA6C17EE-38A9-4E8E-92E3-14D57E4BB546", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "A4F96A84-A69D-4017-A27D-09C7B95BA696", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "7FAD2FF7-1878-49F7-8F44-4E7DC4471F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*", "matchCriteriaId": "62B98B62-F00C-4F3E-B891-18AD04A37725", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*", "matchCriteriaId": "15726391-DF79-4EDE-AE6E-9D7B7E0EB654", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "16C98B61-52A4-4A67-BABA-B83AF6C7851C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*", "matchCriteriaId": "24BF5923-42E7-403E-81F0-D3136C58ECE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets." } ], "id": "CVE-2005-2669", "lastModified": "2024-11-21T00:00:06.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-23T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/16513" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/18917" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14623" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/16513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/18917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-200508-0051
Vulnerability from variot
Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors. This may allow an attacker to escalate their privileges to SYSTEM level. CA Unicenter Management Portal provides access to enterprise management information and various Unicenter management solutions such as personalized WEB interface.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: CA Various Products Message Queuing Vulnerabilities
SECUNIA ADVISORY ID: SA16513
VERIFY ADVISORY: http://secunia.com/advisories/16513/
CRITICAL: Moderately critical
IMPACT: Spoofing, DoS, System access
WHERE:
From local network
SOFTWARE: CA Unicenter TNG 2.x http://secunia.com/product/3206/ CA Unicenter Software Delivery 4.x http://secunia.com/product/5597/ CA Unicenter Software Delivery 3.x http://secunia.com/product/5596/ CA Unicenter Service Level Management 3.x http://secunia.com/product/5595/ CA Unicenter Remote Control 6.x http://secunia.com/product/2622/ CA Unicenter Performance Management for OpenVMS 2.x http://secunia.com/product/5573/ CA Unicenter Network and Systems Management (NSM) Wireless Network Management Option 3.x http://secunia.com/product/5594/ CA Unicenter Network and Systems Management (NSM) 3.x http://secunia.com/product/1683/ CA Unicenter Management for WebSphere MQ 3.x http://secunia.com/product/5590/ CA Unicenter Management for Web Servers 5.x http://secunia.com/product/5593/ CA Unicenter Management for Microsoft Exchange 4.x http://secunia.com/product/5591/ CA Unicenter Management for Lotus Notes/Domino 4.x http://secunia.com/product/5592/ CA Unicenter Jasmine 3.x http://secunia.com/product/5589/ CA Unicenter Enterprise Job Manager 1.x http://secunia.com/product/5588/ CA Unicenter Data Transport Option 2.x http://secunia.com/product/5587/ CA Unicenter Asset Management 4.x http://secunia.com/product/1682/ CA Unicenter Asset Management 3.x http://secunia.com/product/5586/ CA Unicenter Application Performance Monitor 3.x http://secunia.com/product/5585/ CA eTrust Admin 8.x http://secunia.com/product/5584/ CA eTrust Admin 2.x http://secunia.com/product/5583/ CA CleverPath Predictive Analysis Server 3.x http://secunia.com/product/5581/ CA CleverPath Predictive Analysis Server 2.x http://secunia.com/product/5580/ CA CleverPath OLAP 5.x http://secunia.com/product/5578/ CA CleverPath Enterprise Content Manager (ECM) 3.x http://secunia.com/product/5579/ CA CleverPath Aion 10.x http://secunia.com/product/5582/ CA BrightStor SAN Manager 11.x http://secunia.com/product/5576/ CA BrightStor SAN Manager 1.x http://secunia.com/product/5575/ CA BrightStor Portal 11.x http://secunia.com/product/5577/ CA Advantage Data Transport 3.x http://secunia.com/product/5574/
DESCRIPTION: Some vulnerabilities have been reported in various products within the CA Message Queuing (CAM / CAFT) software, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
1) An unspecified error in the CAM service can be exploited to cause a DoS by sending specially crafted packets to the TCP port.
2) Unspecified boundary errors can be exploited to cause buffer overflows by sending specially crafted packets to the service.
3) An error can be exploited to spoof CAFT and execute arbitrary commands with escalated privileges.
The vulnerabilities affect all versions of the CA Message Queuing software prior to versions 1.07 Build 220_13 and 1.11 Build 29_13.
SOLUTION: Apply patches (see vendor advisory for details).
PROVIDED AND/OR DISCOVERED BY: Reported by vendor.
ORIGINAL ADVISORY: Computer Associates: http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200508-0051", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "unicenter tng", "scope": "eq", "trust": 1.6, "vendor": "ca", "version": "2.2" }, { "model": "unicenter software delivery", "scope": "eq", "trust": 1.6, "vendor": "ca", "version": "4.0" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "2.7" }, { "model": "unicenter service level management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.5" }, { "model": "unicenter management portal", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "unicenter tng", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.2" }, { "model": "brightstor san manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "2.1" }, { "model": "cleverpath olap", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "5.1" }, { "model": "unicenter application performance monitor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "unicenter remote control", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "cleverpath aion", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "10.0" }, { "model": "unicenter management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "4.0" }, { "model": "unicenter asset management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "4.0" }, { "model": "unicenter data transport option", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "messaging", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.7" }, { "model": "unicenter management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "3.5" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "2.4" }, { "model": "unicenter management portal", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.1" }, { "model": "unicenter tng", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.1" }, { "model": "unicenter management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "5.0" }, { "model": "unicenter service level management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0.1" }, { "model": "unicenter network and systems management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.1" }, { "model": "unicenter tng", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "unicenter software delivery", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.1" }, { "model": "advantage data transport", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "cleverpath predictive analysis server", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "messaging", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.11" }, { "model": "unicenter management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "4.1" }, { "model": "unicenter performance management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "unicenter service level management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0.2" }, { "model": "unicenter enterprise job manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "unicenter application performance monitor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.5" }, { "model": "unicenter service level management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "brightstor san manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "unicenter nsm wireless network management option", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "unicenter software delivery", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "4.0" }, { "model": "unicenter asset management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.1" }, { "model": "brightstor portal", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "unicenter tng", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4.2" }, { "model": "messaging", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "unicenter asset management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.2" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "2.9" }, { "model": "unicenter management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "5.0.1" }, { "model": "adviseit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "cleverpath predictive analysis server", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "unicenter network and systems management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "cleverpath ecm", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.5" }, { "model": "unicenter asset management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "4.0" }, { "model": "unicenter software delivery", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "8.1" }, { "model": "unicenter jasmine", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "8.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "computer associates", "version": null }, { "model": "message queuing", "scope": "eq", "trust": 0.8, "vendor": "ca", "version": "1.05" }, { "model": "message queuing", "scope": "eq", "trust": 0.8, "vendor": "ca", "version": "1.07 build 220_13 before" }, { "model": "message queuing", "scope": "eq", "trust": 0.8, "vendor": "ca", "version": "1.11 build 29_13 before" }, { "model": "unicenter tng", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.4.2" }, { "model": "unicenter tng", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.1" }, { "model": "unicenter tng", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.4" }, { "model": "unicenter software delivery", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "3.1" }, { "model": "associates unicenter tng", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4.2" }, { "model": "associates unicenter tng", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates unicenter tng", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.2" }, { "model": "associates unicenter tng", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.1" }, { "model": "associates unicenter software delivery sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter software delivery", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter software delivery sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter software delivery sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter software delivery", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter software delivery", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates unicenter service level management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.5" }, { "model": "associates unicenter service level management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0.2" }, { "model": "associates unicenter service level management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0.1" }, { "model": "associates unicenter service level management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates unicenter remote control sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates unicenter remote control", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates unicenter performance management for openvms sp3", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates unicenter nsm wireless network management option", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates unicenter network and systems management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter network and systems management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates unicenter management portal", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter management portal", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates unicenter management for websphere mq", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.5" }, { "model": "associates unicenter management for web servers", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "5.0.1" }, { "model": "associates unicenter management for web servers", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "5.0" }, { "model": "associates unicenter management for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.1" }, { "model": "associates unicenter management for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter management for lotus notes/domino", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter jasmine", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates unicenter enterprise job manager sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates unicenter enterprise job manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates unicenter data transport option", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates unicenter asset management sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter asset management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter asset management sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.2" }, { "model": "associates unicenter asset management sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.2" }, { "model": "associates unicenter asset management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.2" }, { "model": "associates unicenter asset management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter application performance monitor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.5" }, { "model": "associates unicenter application performance monitor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "8.1" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "8.0" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.9" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.7" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.1" }, { "model": "associates cleverpath predictive analysis server", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates cleverpath predictive analysis server", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates cleverpath olap", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "5.1" }, { "model": "associates cleverpath ecm", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.5" }, { "model": "associates cleverpath aion", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "10.0" }, { "model": "associates cam", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.11" }, { "model": "associates cam", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.07" }, { "model": "associates cam", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.05" }, { "model": "associates brightstor san manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "associates brightstor san manager sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates brightstor san manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates brightstor san manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates brightstor portal", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "associates adviseit", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates advantage data transport", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates cam build 29 13", "scope": "ne", "trust": 0.3, "vendor": "computer", "version": "1.11" }, { "model": "associates cam build 220 13", "scope": "ne", "trust": 0.3, "vendor": "computer", "version": "1.07" } ], "sources": [ { "db": "CERT/CC", "id": "VU#619988" }, { "db": "BID", "id": "14622" }, { "db": "JVNDB", "id": "JVNDB-2005-000834" }, { "db": "NVD", "id": "CVE-2005-2668" }, { "db": "CNNVD", "id": "CNNVD-200508-250" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:adviseit:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:messaging:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:messaging:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:3.5:*:websphere_mq:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_management_portal:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_performance_management:2.4:sp3:openvms:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:messaging:1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_management_portal:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-2668" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The discoverer of this vulnerability is currently unknown. The vendor disclosed this issue.", "sources": [ { "db": "BID", "id": "14622" } ], "trust": 0.3 }, "cve": "CVE-2005-2668", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2005-2668", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-13877", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-2668", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#619988", "trust": 0.8, "value": "13.13" }, { "author": "CNNVD", "id": "CNNVD-200508-250", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-13877", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#619988" }, { "db": "VULHUB", "id": "VHN-13877" }, { "db": "JVNDB", "id": "JVNDB-2005-000834" }, { "db": "NVD", "id": "CVE-2005-2668" }, { "db": "CNNVD", "id": "CNNVD-200508-250" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors. This may allow an attacker to escalate their privileges to SYSTEM level. CA Unicenter Management Portal provides access to enterprise management information and various Unicenter management solutions such as personalized WEB interface. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nCA Various Products Message Queuing Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA16513\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/16513/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSpoofing, DoS, System access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nCA Unicenter TNG 2.x\nhttp://secunia.com/product/3206/\nCA Unicenter Software Delivery 4.x\nhttp://secunia.com/product/5597/\nCA Unicenter Software Delivery 3.x\nhttp://secunia.com/product/5596/\nCA Unicenter Service Level Management 3.x\nhttp://secunia.com/product/5595/\nCA Unicenter Remote Control 6.x\nhttp://secunia.com/product/2622/\nCA Unicenter Performance Management for OpenVMS 2.x\nhttp://secunia.com/product/5573/\nCA Unicenter Network and Systems Management (NSM) Wireless Network\nManagement Option 3.x\nhttp://secunia.com/product/5594/\nCA Unicenter Network and Systems Management (NSM) 3.x\nhttp://secunia.com/product/1683/\nCA Unicenter Management for WebSphere MQ 3.x\nhttp://secunia.com/product/5590/\nCA Unicenter Management for Web Servers 5.x\nhttp://secunia.com/product/5593/\nCA Unicenter Management for Microsoft Exchange 4.x\nhttp://secunia.com/product/5591/\nCA Unicenter Management for Lotus Notes/Domino 4.x\nhttp://secunia.com/product/5592/\nCA Unicenter Jasmine 3.x\nhttp://secunia.com/product/5589/\nCA Unicenter Enterprise Job Manager 1.x\nhttp://secunia.com/product/5588/\nCA Unicenter Data Transport Option 2.x\nhttp://secunia.com/product/5587/\nCA Unicenter Asset Management 4.x\nhttp://secunia.com/product/1682/\nCA Unicenter Asset Management 3.x\nhttp://secunia.com/product/5586/\nCA Unicenter Application Performance Monitor 3.x\nhttp://secunia.com/product/5585/\nCA eTrust Admin 8.x\nhttp://secunia.com/product/5584/\nCA eTrust Admin 2.x\nhttp://secunia.com/product/5583/\nCA CleverPath Predictive Analysis Server 3.x\nhttp://secunia.com/product/5581/\nCA CleverPath Predictive Analysis Server 2.x\nhttp://secunia.com/product/5580/\nCA CleverPath OLAP 5.x\nhttp://secunia.com/product/5578/\nCA CleverPath Enterprise Content Manager (ECM) 3.x\nhttp://secunia.com/product/5579/\nCA CleverPath Aion 10.x\nhttp://secunia.com/product/5582/\nCA BrightStor SAN Manager 11.x\nhttp://secunia.com/product/5576/\nCA BrightStor SAN Manager 1.x\nhttp://secunia.com/product/5575/\nCA BrightStor Portal 11.x\nhttp://secunia.com/product/5577/\nCA Advantage Data Transport 3.x\nhttp://secunia.com/product/5574/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in various products within\nthe CA Message Queuing (CAM / CAFT) software, which can be exploited\nby malicious people to cause a DoS (Denial of Service) or compromise\na vulnerable system. \n\n1) An unspecified error in the CAM service can be exploited to cause\na DoS by sending specially crafted packets to the TCP port. \n\n2) Unspecified boundary errors can be exploited to cause buffer\noverflows by sending specially crafted packets to the service. \n\n3) An error can be exploited to spoof CAFT and execute arbitrary\ncommands with escalated privileges. \n\nThe vulnerabilities affect all versions of the CA Message Queuing\nsoftware prior to versions 1.07 Build 220_13 and 1.11 Build 29_13. \n\nSOLUTION:\nApply patches (see vendor advisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by vendor. \n\nORIGINAL ADVISORY:\nComputer Associates:\nhttp://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-2668" }, { "db": "CERT/CC", "id": "VU#619988" }, { "db": "JVNDB", "id": "JVNDB-2005-000834" }, { "db": "BID", "id": "14622" }, { "db": "VULHUB", "id": "VHN-13877" }, { "db": "PACKETSTORM", "id": "39503" } ], "trust": 2.79 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-13877", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-13877" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "14622", "trust": 3.6 }, { "db": "SECUNIA", "id": "16513", "trust": 3.4 }, { "db": "CERT/CC", "id": "VU#619988", "trust": 3.3 }, { "db": "NVD", "id": "CVE-2005-2668", "trust": 2.8 }, { "db": "OSVDB", "id": "18916", "trust": 2.5 }, { "db": "VUPEN", "id": "ADV-2005-1482", "trust": 1.7 }, { "db": "SECTRACK", "id": "1014756", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014760", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014761", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014763", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014764", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014765", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014766", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014767", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014768", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014769", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014770", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014771", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014772", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014773", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014774", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014775", "trust": 0.8 }, { "db": "BID", "id": "14623", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2005-000834", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200508-250", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "16825", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "83148", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-71327", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-13877", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "39503", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#619988" }, { "db": "VULHUB", "id": "VHN-13877" }, { "db": "BID", "id": "14622" }, { "db": "JVNDB", "id": "JVNDB-2005-000834" }, { "db": "PACKETSTORM", "id": "39503" }, { "db": "NVD", "id": "CVE-2005-2668" }, { "db": "CNNVD", "id": "CNNVD-200508-250" } ] }, "id": "VAR-200508-0051", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-13877" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:53:37.537000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "camsecurity_notice", "trust": 0.8, "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "title": "CA Unicenter CAM Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146854" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000834" }, { "db": "CNNVD", "id": "CNNVD-200508-250" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-2668" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://www.securityfocus.com/bid/14622" }, { "trust": 2.9, "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "trust": 2.5, "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/619988" }, { "trust": 2.5, "url": "http://secunia.com/advisories/16513" }, { "trust": 1.7, "url": "http://www.osvdb.org/18916" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "trust": 0.9, "url": "http://secunia.com/advisories/16513/" }, { "trust": 0.8, "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_faqs.asp" }, { "trust": 0.8, "url": "http://osvdb.org/displayvuln.php?osvdb_id=18916" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014775.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014774.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014773.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014772.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014771.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014770.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014769.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014768.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014767.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014766.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014765.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014764.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014763.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014761.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014760.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014756.html" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/14623" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-2668" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2005/1482" }, { "trust": 0.8, "url": "http://jvn.jp//cert/jvnvu619988/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2005-2668" }, { "trust": 0.3, "url": "http://www.designfolks.com.au/karma/cam/" }, { "trust": 0.3, "url": "http://www.ca.com/" }, { "trust": 0.3, "url": "/archive/1/408817" }, { "trust": 0.1, "url": "http://secunia.com/product/5586/" }, { "trust": 0.1, "url": "http://secunia.com/product/5575/" }, { "trust": 0.1, "url": "http://secunia.com/product/5581/" }, { "trust": 0.1, "url": "http://secunia.com/product/5574/" }, { "trust": 0.1, "url": "http://secunia.com/product/5585/" }, { "trust": 0.1, "url": "http://secunia.com/product/5580/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/5595/" }, { "trust": 0.1, "url": "http://secunia.com/product/5587/" }, { "trust": 0.1, "url": "http://secunia.com/product/5594/" }, { "trust": 0.1, "url": "http://secunia.com/product/5591/" }, { "trust": 0.1, "url": "http://secunia.com/product/5583/" }, { "trust": 0.1, "url": "http://secunia.com/product/5576/" }, { "trust": 0.1, "url": "http://secunia.com/product/1682/" }, { "trust": 0.1, "url": "http://secunia.com/product/5577/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5590/" }, { "trust": 0.1, "url": "http://secunia.com/product/5582/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/3206/" }, { "trust": 0.1, "url": "http://secunia.com/product/5596/" }, { "trust": 0.1, "url": "http://secunia.com/product/2622/" }, { "trust": 0.1, "url": "http://secunia.com/product/5588/" }, { "trust": 0.1, "url": "http://secunia.com/product/5584/" }, { "trust": 0.1, "url": "http://secunia.com/product/5578/" }, { "trust": 0.1, "url": "http://secunia.com/product/5573/" }, { "trust": 0.1, "url": "http://secunia.com/product/5579/" }, { "trust": 0.1, "url": "http://secunia.com/product/1683/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5589/" }, { "trust": 0.1, "url": "http://secunia.com/product/5593/" }, { "trust": 0.1, "url": "http://secunia.com/product/5592/" }, { "trust": 0.1, "url": "http://secunia.com/product/5597/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#619988" }, { "db": "VULHUB", "id": "VHN-13877" }, { "db": "BID", "id": "14622" }, { "db": "JVNDB", "id": "JVNDB-2005-000834" }, { "db": "PACKETSTORM", "id": "39503" }, { "db": "NVD", "id": "CVE-2005-2668" }, { "db": "CNNVD", "id": "CNNVD-200508-250" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#619988" }, { "db": "VULHUB", "id": "VHN-13877" }, { "db": "BID", "id": "14622" }, { "db": "JVNDB", "id": "JVNDB-2005-000834" }, { "db": "PACKETSTORM", "id": "39503" }, { "db": "NVD", "id": "CVE-2005-2668" }, { "db": "CNNVD", "id": "CNNVD-200508-250" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-08-23T00:00:00", "db": "CERT/CC", "id": "VU#619988" }, { "date": "2005-08-23T00:00:00", "db": "VULHUB", "id": "VHN-13877" }, { "date": "2005-08-22T00:00:00", "db": "BID", "id": "14622" }, { "date": "2008-11-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000834" }, { "date": "2005-08-23T23:30:33", "db": "PACKETSTORM", "id": "39503" }, { "date": "2005-08-23T04:00:00", "db": "NVD", "id": "CVE-2005-2668" }, { "date": "2005-08-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200508-250" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-10-21T00:00:00", "db": "CERT/CC", "id": "VU#619988" }, { "date": "2017-11-22T00:00:00", "db": "VULHUB", "id": "VHN-13877" }, { "date": "2007-11-15T00:37:00", "db": "BID", "id": "14622" }, { "date": "2008-11-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000834" }, { "date": "2021-04-14T15:46:28.003000", "db": "NVD", "id": "CVE-2005-2668" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200508-250" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200508-250" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Computer Associates Message Queuing software vulnerable to buffer overflows", "sources": [ { "db": "CERT/CC", "id": "VU#619988" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200508-250" } ], "trust": 0.6 } }
var-200508-0052
Vulnerability from variot
Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets. CAM is prone to a vulnerability that could permit the spoofing of a CAFT application utilizing the CAM instance. This may ultimately allow the execution of arbitrary commands. CAFT is a file transfer application that utilizes CAM to send and receive the files. The problem presents itself due to a failure in the CAM service to verify the legitimacy of the CAFT application.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: CA Various Products Message Queuing Vulnerabilities
SECUNIA ADVISORY ID: SA16513
VERIFY ADVISORY: http://secunia.com/advisories/16513/
CRITICAL: Moderately critical
IMPACT: Spoofing, DoS, System access
WHERE:
From local network
SOFTWARE: CA Unicenter TNG 2.x http://secunia.com/product/3206/ CA Unicenter Software Delivery 4.x http://secunia.com/product/5597/ CA Unicenter Software Delivery 3.x http://secunia.com/product/5596/ CA Unicenter Service Level Management 3.x http://secunia.com/product/5595/ CA Unicenter Remote Control 6.x http://secunia.com/product/2622/ CA Unicenter Performance Management for OpenVMS 2.x http://secunia.com/product/5573/ CA Unicenter Network and Systems Management (NSM) Wireless Network Management Option 3.x http://secunia.com/product/5594/ CA Unicenter Network and Systems Management (NSM) 3.x http://secunia.com/product/1683/ CA Unicenter Management for WebSphere MQ 3.x http://secunia.com/product/5590/ CA Unicenter Management for Web Servers 5.x http://secunia.com/product/5593/ CA Unicenter Management for Microsoft Exchange 4.x http://secunia.com/product/5591/ CA Unicenter Management for Lotus Notes/Domino 4.x http://secunia.com/product/5592/ CA Unicenter Jasmine 3.x http://secunia.com/product/5589/ CA Unicenter Enterprise Job Manager 1.x http://secunia.com/product/5588/ CA Unicenter Data Transport Option 2.x http://secunia.com/product/5587/ CA Unicenter Asset Management 4.x http://secunia.com/product/1682/ CA Unicenter Asset Management 3.x http://secunia.com/product/5586/ CA Unicenter Application Performance Monitor 3.x http://secunia.com/product/5585/ CA eTrust Admin 8.x http://secunia.com/product/5584/ CA eTrust Admin 2.x http://secunia.com/product/5583/ CA CleverPath Predictive Analysis Server 3.x http://secunia.com/product/5581/ CA CleverPath Predictive Analysis Server 2.x http://secunia.com/product/5580/ CA CleverPath OLAP 5.x http://secunia.com/product/5578/ CA CleverPath Enterprise Content Manager (ECM) 3.x http://secunia.com/product/5579/ CA CleverPath Aion 10.x http://secunia.com/product/5582/ CA BrightStor SAN Manager 11.x http://secunia.com/product/5576/ CA BrightStor SAN Manager 1.x http://secunia.com/product/5575/ CA BrightStor Portal 11.x http://secunia.com/product/5577/ CA Advantage Data Transport 3.x http://secunia.com/product/5574/
DESCRIPTION: Some vulnerabilities have been reported in various products within the CA Message Queuing (CAM / CAFT) software, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
1) An unspecified error in the CAM service can be exploited to cause a DoS by sending specially crafted packets to the TCP port.
2) Unspecified boundary errors can be exploited to cause buffer overflows by sending specially crafted packets to the service.
SOLUTION: Apply patches (see vendor advisory for details).
PROVIDED AND/OR DISCOVERED BY: Reported by vendor.
ORIGINAL ADVISORY: Computer Associates: http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200508-0052", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "unicenter tng", "scope": "eq", "trust": 1.6, "vendor": "ca", "version": "2.2" }, { "model": "unicenter software delivery", "scope": "eq", "trust": 1.6, "vendor": "ca", "version": "4.0" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "2.7" }, { "model": "unicenter service level management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.5" }, { "model": "unicenter management portal", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "unicenter tng", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.2" }, { "model": "brightstor san manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "2.1" }, { "model": "cleverpath olap", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "5.1" }, { "model": "unicenter application performance monitor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "unicenter remote control", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "cleverpath aion", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "10.0" }, { "model": "unicenter management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "4.0" }, { "model": "unicenter asset management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "4.0" }, { "model": "unicenter data transport option", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "messaging", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.7" }, { "model": "unicenter management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "3.5" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "2.4" }, { "model": "unicenter management portal", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.1" }, { "model": "unicenter tng", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.1" }, { "model": "unicenter management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "5.0" }, { "model": "unicenter service level management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0.1" }, { "model": "unicenter network and systems management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.1" }, { "model": "unicenter tng", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "unicenter software delivery", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.1" }, { "model": "advantage data transport", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "cleverpath predictive analysis server", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "messaging", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.11" }, { "model": "unicenter management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "4.1" }, { "model": "unicenter performance management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "unicenter service level management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0.2" }, { "model": "unicenter enterprise job manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "unicenter application performance monitor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.5" }, { "model": "unicenter service level management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "brightstor san manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "unicenter nsm wireless network management option", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "unicenter software delivery", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "4.0" }, { "model": "unicenter asset management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.1" }, { "model": "brightstor portal", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "unicenter tng", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4.2" }, { "model": "messaging", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "unicenter asset management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.2" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "2.9" }, { "model": "unicenter management", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "5.0.1" }, { "model": "adviseit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "cleverpath predictive analysis server", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "unicenter network and systems management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "cleverpath ecm", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.5" }, { "model": "unicenter asset management", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "4.0" }, { "model": "unicenter software delivery", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "8.1" }, { "model": "unicenter jasmine", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "3.0" }, { "model": "etrust admin", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "8.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "computer associates", "version": null }, { "model": "unicenter tng", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.4.2" }, { "model": "unicenter tng", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.1" }, { "model": "unicenter tng", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.4" }, { "model": "unicenter software delivery", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "3.1" }, { "model": "associates unicenter tng", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4.2" }, { "model": "associates unicenter tng", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates unicenter tng", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.2" }, { "model": "associates unicenter tng", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.1" }, { "model": "associates unicenter software delivery sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter software delivery", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter software delivery sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter software delivery sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter software delivery", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter software delivery", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates unicenter service level management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.5" }, { "model": "associates unicenter service level management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0.2" }, { "model": "associates unicenter service level management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0.1" }, { "model": "associates unicenter service level management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates unicenter remote control sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates unicenter remote control", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates unicenter performance management for openvms sp3", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates unicenter nsm wireless network management option", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates unicenter network and systems management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter network and systems management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates unicenter management portal", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter management portal", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates unicenter management for websphere mq", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.5" }, { "model": "associates unicenter management for web servers", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "5.0.1" }, { "model": "associates unicenter management for web servers", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "5.0" }, { "model": "associates unicenter management for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.1" }, { "model": "associates unicenter management for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter management for lotus notes/domino", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter jasmine", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates unicenter enterprise job manager sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates unicenter enterprise job manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates unicenter data transport option", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates unicenter asset management sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter asset management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "4.0" }, { "model": "associates unicenter asset management sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.2" }, { "model": "associates unicenter asset management sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.2" }, { "model": "associates unicenter asset management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.2" }, { "model": "associates unicenter asset management", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.1" }, { "model": "associates unicenter application performance monitor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.5" }, { "model": "associates unicenter application performance monitor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "8.1" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "8.0" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.9" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.7" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates etrust admin", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.1" }, { "model": "associates cleverpath predictive analysis server", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates cleverpath predictive analysis server", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates cleverpath olap", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "5.1" }, { "model": "associates cleverpath ecm", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.5" }, { "model": "associates cleverpath aion", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "10.0" }, { "model": "associates cam", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.11" }, { "model": "associates cam", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.07" }, { "model": "associates cam", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.05" }, { "model": "associates brightstor san manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "associates brightstor san manager sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates brightstor san manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates brightstor san manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates brightstor portal", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "associates adviseit", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates advantage data transport", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "3.0" }, { "model": "associates cam build 29 13", "scope": "ne", "trust": 0.3, "vendor": "computer", "version": "1.11" }, { "model": "associates cam build 220 13", "scope": "ne", "trust": 0.3, "vendor": "computer", "version": "1.07" } ], "sources": [ { "db": "CERT/CC", "id": "VU#619988" }, { "db": "BID", "id": "14623" }, { "db": "NVD", "id": "CVE-2005-2669" }, { "db": "CNNVD", "id": "CNNVD-200508-223" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:messaging:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:messaging:1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_management_portal:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_management_portal:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:3.5:*:websphere_mq:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:adviseit:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:messaging:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_performance_management:2.4:sp3:openvms:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-2669" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The discoverer of this issue is currently unknown. The vendor disclosed this issue.", "sources": [ { "db": "BID", "id": "14623" }, { "db": "CNNVD", "id": "CNNVD-200508-223" } ], "trust": 0.9 }, "cve": "CVE-2005-2669", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-13878", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-2669", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#619988", "trust": 0.8, "value": "13.13" }, { "author": "CNNVD", "id": "CNNVD-200508-223", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-13878", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#619988" }, { "db": "VULHUB", "id": "VHN-13878" }, { "db": "NVD", "id": "CVE-2005-2669" }, { "db": "CNNVD", "id": "CNNVD-200508-223" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets. CAM is prone to a vulnerability that could permit the spoofing of a CAFT application utilizing the CAM instance. This may ultimately allow the execution of arbitrary commands. \nCAFT is a file transfer application that utilizes CAM to send and receive the files. The problem presents itself due to a failure in the CAM service to verify the legitimacy of the CAFT application. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nCA Various Products Message Queuing Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA16513\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/16513/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSpoofing, DoS, System access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nCA Unicenter TNG 2.x\nhttp://secunia.com/product/3206/\nCA Unicenter Software Delivery 4.x\nhttp://secunia.com/product/5597/\nCA Unicenter Software Delivery 3.x\nhttp://secunia.com/product/5596/\nCA Unicenter Service Level Management 3.x\nhttp://secunia.com/product/5595/\nCA Unicenter Remote Control 6.x\nhttp://secunia.com/product/2622/\nCA Unicenter Performance Management for OpenVMS 2.x\nhttp://secunia.com/product/5573/\nCA Unicenter Network and Systems Management (NSM) Wireless Network\nManagement Option 3.x\nhttp://secunia.com/product/5594/\nCA Unicenter Network and Systems Management (NSM) 3.x\nhttp://secunia.com/product/1683/\nCA Unicenter Management for WebSphere MQ 3.x\nhttp://secunia.com/product/5590/\nCA Unicenter Management for Web Servers 5.x\nhttp://secunia.com/product/5593/\nCA Unicenter Management for Microsoft Exchange 4.x\nhttp://secunia.com/product/5591/\nCA Unicenter Management for Lotus Notes/Domino 4.x\nhttp://secunia.com/product/5592/\nCA Unicenter Jasmine 3.x\nhttp://secunia.com/product/5589/\nCA Unicenter Enterprise Job Manager 1.x\nhttp://secunia.com/product/5588/\nCA Unicenter Data Transport Option 2.x\nhttp://secunia.com/product/5587/\nCA Unicenter Asset Management 4.x\nhttp://secunia.com/product/1682/\nCA Unicenter Asset Management 3.x\nhttp://secunia.com/product/5586/\nCA Unicenter Application Performance Monitor 3.x\nhttp://secunia.com/product/5585/\nCA eTrust Admin 8.x\nhttp://secunia.com/product/5584/\nCA eTrust Admin 2.x\nhttp://secunia.com/product/5583/\nCA CleverPath Predictive Analysis Server 3.x\nhttp://secunia.com/product/5581/\nCA CleverPath Predictive Analysis Server 2.x\nhttp://secunia.com/product/5580/\nCA CleverPath OLAP 5.x\nhttp://secunia.com/product/5578/\nCA CleverPath Enterprise Content Manager (ECM) 3.x\nhttp://secunia.com/product/5579/\nCA CleverPath Aion 10.x\nhttp://secunia.com/product/5582/\nCA BrightStor SAN Manager 11.x\nhttp://secunia.com/product/5576/\nCA BrightStor SAN Manager 1.x\nhttp://secunia.com/product/5575/\nCA BrightStor Portal 11.x\nhttp://secunia.com/product/5577/\nCA Advantage Data Transport 3.x\nhttp://secunia.com/product/5574/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in various products within\nthe CA Message Queuing (CAM / CAFT) software, which can be exploited\nby malicious people to cause a DoS (Denial of Service) or compromise\na vulnerable system. \n\n1) An unspecified error in the CAM service can be exploited to cause\na DoS by sending specially crafted packets to the TCP port. \n\n2) Unspecified boundary errors can be exploited to cause buffer\noverflows by sending specially crafted packets to the service. \n\nSOLUTION:\nApply patches (see vendor advisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by vendor. \n\nORIGINAL ADVISORY:\nComputer Associates:\nhttp://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-2669" }, { "db": "CERT/CC", "id": "VU#619988" }, { "db": "BID", "id": "14623" }, { "db": "VULHUB", "id": "VHN-13878" }, { "db": "PACKETSTORM", "id": "39503" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "14623", "trust": 2.8 }, { "db": "SECUNIA", "id": "16513", "trust": 2.6 }, { "db": "NVD", "id": "CVE-2005-2669", "trust": 2.0 }, { "db": "OSVDB", "id": "18917", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2005-1482", "trust": 1.7 }, { "db": "SECTRACK", "id": "1014756", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014760", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014761", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014763", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014764", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014765", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014766", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014767", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014768", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014769", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014770", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014771", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014772", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014773", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014774", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014775", "trust": 0.8 }, { "db": "OSVDB", "id": "18916", "trust": 0.8 }, { "db": "BID", "id": "14622", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#619988", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200508-223", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-13878", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "39503", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#619988" }, { "db": "VULHUB", "id": "VHN-13878" }, { "db": "BID", "id": "14623" }, { "db": "PACKETSTORM", "id": "39503" }, { "db": "NVD", "id": "CVE-2005-2669" }, { "db": "CNNVD", "id": "CNNVD-200508-223" } ] }, "id": "VAR-200508-0052", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-13878" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:53:37.580000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Computer Associates Message Queuing Security hole Repair measures", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146856" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200508-223" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-2669" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "trust": 2.5, "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/14623" }, { "trust": 1.7, "url": "http://www.osvdb.org/18917" }, { "trust": 1.7, "url": "http://secunia.com/advisories/16513" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "trust": 0.9, "url": "http://secunia.com/advisories/16513/" }, { "trust": 0.8, "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_faqs.asp" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/14622" }, { "trust": 0.8, "url": "http://osvdb.org/displayvuln.php?osvdb_id=18916" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014775.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014774.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014773.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014772.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014771.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014770.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014769.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014768.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014767.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014766.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014765.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014764.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014763.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014761.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014760.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/aug/1014756.html" }, { "trust": 0.3, "url": "http://www.ca.com/" }, { "trust": 0.3, "url": "/archive/1/408817" }, { "trust": 0.1, "url": "http://secunia.com/product/5586/" }, { "trust": 0.1, "url": "http://secunia.com/product/5575/" }, { "trust": 0.1, "url": "http://secunia.com/product/5581/" }, { "trust": 0.1, "url": "http://secunia.com/product/5574/" }, { "trust": 0.1, "url": "http://secunia.com/product/5585/" }, { "trust": 0.1, "url": "http://secunia.com/product/5580/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/5595/" }, { "trust": 0.1, "url": "http://secunia.com/product/5587/" }, { "trust": 0.1, "url": "http://secunia.com/product/5594/" }, { "trust": 0.1, "url": "http://secunia.com/product/5591/" }, { "trust": 0.1, "url": "http://secunia.com/product/5583/" }, { "trust": 0.1, "url": "http://secunia.com/product/5576/" }, { "trust": 0.1, "url": "http://secunia.com/product/1682/" }, { "trust": 0.1, "url": "http://secunia.com/product/5577/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5590/" }, { "trust": 0.1, "url": "http://secunia.com/product/5582/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/3206/" }, { "trust": 0.1, "url": "http://secunia.com/product/5596/" }, { "trust": 0.1, "url": "http://secunia.com/product/2622/" }, { "trust": 0.1, "url": "http://secunia.com/product/5588/" }, { "trust": 0.1, "url": "http://secunia.com/product/5584/" }, { "trust": 0.1, "url": "http://secunia.com/product/5578/" }, { "trust": 0.1, "url": "http://secunia.com/product/5573/" }, { "trust": 0.1, "url": "http://secunia.com/product/5579/" }, { "trust": 0.1, "url": "http://secunia.com/product/1683/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5589/" }, { "trust": 0.1, "url": "http://secunia.com/product/5593/" }, { "trust": 0.1, "url": "http://secunia.com/product/5592/" }, { "trust": 0.1, "url": "http://secunia.com/product/5597/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#619988" }, { "db": "VULHUB", "id": "VHN-13878" }, { "db": "BID", "id": "14623" }, { "db": "PACKETSTORM", "id": "39503" }, { "db": "NVD", "id": "CVE-2005-2669" }, { "db": "CNNVD", "id": "CNNVD-200508-223" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#619988" }, { "db": "VULHUB", "id": "VHN-13878" }, { "db": "BID", "id": "14623" }, { "db": "PACKETSTORM", "id": "39503" }, { "db": "NVD", "id": "CVE-2005-2669" }, { "db": "CNNVD", "id": "CNNVD-200508-223" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-08-23T00:00:00", "db": "CERT/CC", "id": "VU#619988" }, { "date": "2005-08-23T00:00:00", "db": "VULHUB", "id": "VHN-13878" }, { "date": "2005-08-22T00:00:00", "db": "BID", "id": "14623" }, { "date": "2005-08-23T23:30:33", "db": "PACKETSTORM", "id": "39503" }, { "date": "2005-08-23T04:00:00", "db": "NVD", "id": "CVE-2005-2669" }, { "date": "2005-08-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200508-223" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-10-21T00:00:00", "db": "CERT/CC", "id": "VU#619988" }, { "date": "2017-11-21T00:00:00", "db": "VULHUB", "id": "VHN-13878" }, { "date": "2009-07-12T17:06:00", "db": "BID", "id": "14623" }, { "date": "2021-04-14T15:46:28.003000", "db": "NVD", "id": "CVE-2005-2669" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200508-223" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200508-223" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Computer Associates Message Queuing software vulnerable to buffer overflows", "sources": [ { "db": "CERT/CC", "id": "VU#619988" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200508-223" } ], "trust": 0.6 } }