Vulnerabilites related to broadcom - unicenter_network_and_systems_management
cve-2007-3875
Vulnerability from cvelistv5
Published
2007-07-26 00:00
Modified
2024-08-07 14:37
Severity ?
EPSS score ?
Summary
arclib.dll before 7.3.0.9 in CA Anti-Virus (formerly eTrust Antivirus) 8 and certain other CA products allows remote attackers to cause a denial of service (infinite loop and loss of antivirus functionality) via an invalid "previous listing chunk number" field in a CHM file.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1018450 | vdb-entry, x_refsource_SECTRACK | |
http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847 | x_refsource_CONFIRM | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567 | third-party-advisory, x_refsource_IDEFENSE | |
http://www.securityfocus.com/archive/1/474605/100/100/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2007/2639 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/474601/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35573 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/474683/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/25049 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/26155 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:37:04.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1018450", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018450" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847" }, { "name": "20070724 Computer Associates AntiVirus CHM File Handling DoS Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567" }, { "name": "20070725 n.runs-SA-2007.024 - CA eTrust Antivirus Infinite Loop DoS (remote) Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/474605/100/100/threaded" }, { "name": "ADV-2007-2639", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2639" }, { "name": "20070725 [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/474601/100/0/threaded" }, { "name": "ca-arclib-chm-dos(35573)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35573" }, { "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp" }, { "name": "25049", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25049" }, { "name": "26155", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26155" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "arclib.dll before 7.3.0.9 in CA Anti-Virus (formerly eTrust Antivirus) 8 and certain other CA products allows remote attackers to cause a denial of service (infinite loop and loss of antivirus functionality) via an invalid \"previous listing chunk number\" field in a CHM file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1018450", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018450" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847" }, { "name": "20070724 Computer Associates AntiVirus CHM File Handling DoS Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567" }, { "name": "20070725 n.runs-SA-2007.024 - CA eTrust Antivirus Infinite Loop DoS (remote) Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/474605/100/100/threaded" }, { "name": "ADV-2007-2639", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2639" }, { "name": "20070725 [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/474601/100/0/threaded" }, { "name": "ca-arclib-chm-dos(35573)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35573" }, { "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp" }, { "name": "25049", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25049" }, { "name": "26155", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26155" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "arclib.dll before 7.3.0.9 in CA Anti-Virus (formerly eTrust Antivirus) 8 and certain other CA products allows remote attackers to cause a denial of service (infinite loop and loss of antivirus functionality) via an invalid \"previous listing chunk number\" field in a CHM file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1018450", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018450" }, { "name": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847", "refsource": "CONFIRM", "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847" }, { "name": "20070724 Computer Associates AntiVirus CHM File Handling DoS Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567" }, { "name": "20070725 n.runs-SA-2007.024 - CA eTrust Antivirus Infinite Loop DoS (remote) Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/474605/100/100/threaded" }, { "name": "ADV-2007-2639", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2639" }, { "name": "20070725 [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/474601/100/0/threaded" }, { "name": "ca-arclib-chm-dos(35573)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35573" }, { "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded" }, { "name": "http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp" }, { "name": "25049", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25049" }, { "name": "26155", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26155" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3875", "datePublished": "2007-07-26T00:00:00", "dateReserved": "2007-07-18T00:00:00", "dateUpdated": "2024-08-07T14:37:04.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2668
Vulnerability from cvelistv5
Published
2005-08-23 04:00
Modified
2024-08-07 22:45
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/14622 | vdb-entry, x_refsource_BID | |
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 | x_refsource_MISC | |
http://www.osvdb.org/18916 | vdb-entry, x_refsource_OSVDB | |
http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp | x_refsource_CONFIRM | |
http://secunia.com/advisories/16513 | third-party-advisory, x_refsource_SECUNIA | |
http://www.kb.cert.org/vuls/id/619988 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2005/1482 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:01.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "14622", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14622" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18916", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/18916" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16513" }, { "name": "VU#619988", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/619988" }, { "name": "ADV-2005-1482", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-09-08T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "14622", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14622" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18916", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/18916" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16513" }, { "name": "VU#619988", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/619988" }, { "name": "ADV-2005-1482", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "14622", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14622" }, { "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919", "refsource": "MISC", "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18916", "refsource": "OSVDB", "url": "http://www.osvdb.org/18916" }, { "name": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16513" }, { "name": "VU#619988", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/619988" }, { "name": "ADV-2005-1482", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1482" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2668", "datePublished": "2005-08-23T04:00:00", "dateReserved": "2005-08-23T00:00:00", "dateUpdated": "2024-08-07T22:45:01.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3587
Vulnerability from cvelistv5
Published
2009-10-13 10:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588.
References
▼ | URL | Tags |
---|---|---|
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878 | x_refsource_CONFIRM | |
http://osvdb.org/58691 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/36976 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1022999 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2009/2852 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/53697 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/507068/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/36653 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "58691", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/58691" }, { "name": "36976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "ca-rar-code-execution(53697)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "58691", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/58691" }, { "name": "36976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "ca-rar-code-execution(53697)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3587", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878", "refsource": "CONFIRM", "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "58691", "refsource": "OSVDB", "url": "http://osvdb.org/58691" }, { "name": "36976", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "ca-rar-code-execution(53697)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36653" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3587", "datePublished": "2009-10-13T10:00:00", "dateReserved": "2009-10-08T00:00:00", "dateUpdated": "2024-08-07T06:31:10.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0060
Vulnerability from cvelistv5
Published
2007-07-26 00:00
Modified
2024-08-07 12:03
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104.
References
▼ | URL | Tags |
---|---|---|
http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/2638 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32234 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1018449 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/26190 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/474602/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/25051 | vdb-entry, x_refsource_BID | |
http://www.iss.net/threats/272.html | third-party-advisory, x_refsource_ISS | |
http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:03:36.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp" }, { "name": "ADV-2007-2638", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2638" }, { "name": "systems-management-bo(32234)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32234" }, { "name": "1018449", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018449" }, { "name": "26190", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26190" }, { "name": "20070725 [CAID 35527]: CA Message Queuing (CAM / CAFT) Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/474602/100/0/threaded" }, { "name": "25051", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25051" }, { "name": "20070724 CA Message Queuing Server (Cam.exe) Overflow", "tags": [ "third-party-advisory", "x_refsource_ISS", "x_transferred" ], "url": "http://www.iss.net/threats/272.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp" }, { "name": "ADV-2007-2638", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2638" }, { "name": "systems-management-bo(32234)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32234" }, { "name": "1018449", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018449" }, { "name": "26190", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26190" }, { "name": "20070725 [CAID 35527]: CA Message Queuing (CAM / CAFT) Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/474602/100/0/threaded" }, { "name": "25051", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25051" }, { "name": "20070724 CA Message Queuing Server (Cam.exe) Overflow", "tags": [ "third-party-advisory", "x_refsource_ISS" ], "url": "http://www.iss.net/threats/272.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0060", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp" }, { "name": "ADV-2007-2638", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2638" }, { "name": "systems-management-bo(32234)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32234" }, { "name": "1018449", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018449" }, { "name": "26190", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26190" }, { "name": "20070725 [CAID 35527]: CA Message Queuing (CAM / CAFT) Buffer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/474602/100/0/threaded" }, { "name": "25051", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25051" }, { "name": "20070724 CA Message Queuing Server (Cam.exe) Overflow", "refsource": "ISS", "url": "http://www.iss.net/threats/272.html" }, { "name": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809", "refsource": "CONFIRM", "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0060", "datePublished": "2007-07-26T00:00:00", "dateReserved": "2007-01-04T00:00:00", "dateUpdated": "2024-08-07T12:03:36.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2436
Vulnerability from cvelistv5
Published
2005-08-20 04:00
Modified
2024-08-08 01:29
Severity ?
EPSS score ?
Summary
Computer Associates Unicenter Common Services 3.0 and earlier stores the database "SA" password in cleartext in the TndAddNspTmp.bat file, which could allow local users to gain privileges.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/displayvuln.php?osvdb_id=10408 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/12639/ | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1011468 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/11277 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17562 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:13.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "10408", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/displayvuln.php?osvdb_id=10408" }, { "name": "12639", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12639/" }, { "name": "1011468", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1011468" }, { "name": "11277", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11277" }, { "name": "unicenter-tndaddnsptmp-information-disclosure(17562)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17562" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Computer Associates Unicenter Common Services 3.0 and earlier stores the database \"SA\" password in cleartext in the TndAddNspTmp.bat file, which could allow local users to gain privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "10408", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/displayvuln.php?osvdb_id=10408" }, { "name": "12639", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12639/" }, { "name": "1011468", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1011468" }, { "name": "11277", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11277" }, { "name": "unicenter-tndaddnsptmp-information-disclosure(17562)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17562" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Computer Associates Unicenter Common Services 3.0 and earlier stores the database \"SA\" password in cleartext in the TndAddNspTmp.bat file, which could allow local users to gain privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "10408", "refsource": "OSVDB", "url": "http://osvdb.org/displayvuln.php?osvdb_id=10408" }, { "name": "12639", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12639/" }, { "name": "1011468", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011468" }, { "name": "11277", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11277" }, { "name": "unicenter-tndaddnsptmp-information-disclosure(17562)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17562" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2436", "datePublished": "2005-08-20T04:00:00", "dateReserved": "2005-08-20T00:00:00", "dateUpdated": "2024-08-08T01:29:13.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2669
Vulnerability from cvelistv5
Published
2005-08-23 04:00
Modified
2024-08-07 22:45
Severity ?
EPSS score ?
Summary
Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets.
References
▼ | URL | Tags |
---|---|---|
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919 | x_refsource_MISC | |
http://www.osvdb.org/18917 | vdb-entry, x_refsource_OSVDB | |
http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp | x_refsource_CONFIRM | |
http://secunia.com/advisories/16513 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/14623 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2005/1482 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:01.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18917", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/18917" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16513" }, { "name": "14623", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14623" }, { "name": "ADV-2005-1482", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18917", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/18917" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16513" }, { "name": "14623", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14623" }, { "name": "ADV-2005-1482", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2669", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919", "refsource": "MISC", "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "name": "18917", "refsource": "OSVDB", "url": "http://www.osvdb.org/18917" }, { "name": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "name": "16513", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16513" }, { "name": "14623", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14623" }, { "name": "ADV-2005-1482", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1482" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2669", "datePublished": "2005-08-23T04:00:00", "dateReserved": "2005-08-23T00:00:00", "dateUpdated": "2024-08-07T22:45:01.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3588
Vulnerability from cvelistv5
Published
2009-10-13 10:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/53698 | vdb-entry, x_refsource_XF | |
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878 | x_refsource_CONFIRM | |
http://secunia.com/advisories/36976 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1022999 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2009/2852 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/507068/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/36653 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ca-rar-dos(53698)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53698" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "36976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ca-rar-dos(53698)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53698" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "36976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3588", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ca-rar-dos(53698)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53698" }, { "name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878", "refsource": "CONFIRM", "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "name": "36976", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36976" }, { "name": "1022999", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022999" }, { "name": "ADV-2009-2852", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "name": "20091009 CA20091008-01: Security Notice for CA Anti-Virus Engine", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "name": "36653", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36653" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3588", "datePublished": "2009-10-13T10:00:00", "dateReserved": "2009-10-08T00:00:00", "dateUpdated": "2024-08-07T06:31:10.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2864
Vulnerability from cvelistv5
Published
2007-06-06 21:00
Modified
2024-08-07 13:57
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/24330 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/470602/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp | x_refsource_CONFIRM | |
http://www.kb.cert.org/vuls/id/105105 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2007/2072 | vdb-entry, x_refsource_VUPEN | |
http://www.zerodayinitiative.com/advisories/ZDI-07-035.html | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/470754/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34737 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1018199 | vdb-entry, x_refsource_SECTRACK | |
http://www.osvdb.org/35245 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/25570 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:57:54.318Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "24330", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24330" }, { "name": "20070605 ZDI-07-035: CA Multiple Product AV Engine CAB Header Parsing Stack Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/470602/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp" }, { "name": "VU#105105", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/105105" }, { "name": "ADV-2007-2072", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2072" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-035.html" }, { "name": "20070607 [CAID 35395, 35396]: CA Anti-Virus Engine CAB File Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/470754/100/0/threaded" }, { "name": "ca-multiple-antivirus-cofffiles-bo(34737)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34737" }, { "name": "1018199", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018199" }, { "name": "35245", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/35245" }, { "name": "25570", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25570" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-06-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "24330", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24330" }, { "name": "20070605 ZDI-07-035: CA Multiple Product AV Engine CAB Header Parsing Stack Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/470602/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp" }, { "name": "VU#105105", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/105105" }, { "name": "ADV-2007-2072", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2072" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-035.html" }, { "name": "20070607 [CAID 35395, 35396]: CA Anti-Virus Engine CAB File Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/470754/100/0/threaded" }, { "name": "ca-multiple-antivirus-cofffiles-bo(34737)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34737" }, { "name": "1018199", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018199" }, { "name": "35245", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/35245" }, { "name": "25570", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25570" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2864", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "24330", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24330" }, { "name": "20070605 ZDI-07-035: CA Multiple Product AV Engine CAB Header Parsing Stack Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/470602/100/0/threaded" }, { "name": "http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp", "refsource": "CONFIRM", "url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp" }, { "name": "VU#105105", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/105105" }, { "name": "ADV-2007-2072", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2072" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-035.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-035.html" }, { "name": "20070607 [CAID 35395, 35396]: CA Anti-Virus Engine CAB File Buffer Overflow Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/470754/100/0/threaded" }, { "name": "ca-multiple-antivirus-cofffiles-bo(34737)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34737" }, { "name": "1018199", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018199" }, { "name": "35245", "refsource": "OSVDB", "url": "http://www.osvdb.org/35245" }, { "name": "25570", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25570" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2864", "datePublished": "2007-06-06T21:00:00", "dateReserved": "2007-05-24T00:00:00", "dateUpdated": "2024-08-07T13:57:54.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:53
Severity ?
Summary
Computer Associates Unicenter Common Services 3.0 and earlier stores the database "SA" password in cleartext in the TndAddNspTmp.bat file, which could allow local users to gain privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
broadcom | common_services | 1.0 | |
broadcom | common_services | 1.1 | |
broadcom | common_services | 2.0 | |
broadcom | common_services | 2.1 | |
broadcom | common_services | 2.2 | |
broadcom | common_services | 3.0 | |
broadcom | unicenter_network_and_systems_management | 3.0 | |
broadcom | unicenter_serviceplus_service_desk | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:common_services:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3A0DD264-59A8-4B76-8D7F-138AEA7B1912", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "062DB370-929D-4FE1-A925-2FB5706C9409", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0D7957A4-D763-488F-B2B1-E00F428AD1AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F5A6578-902D-4D9F-AB19-C6484E878CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E2E79928-E5E2-42E5-9E09-58ADF9E76A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7587982-C722-4754-8744-8C7D43E191B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_serviceplus_service_desk:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "D8FDCBBD-81F0-4B13-8D29-624ABEE86341", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Computer Associates Unicenter Common Services 3.0 and earlier stores the database \"SA\" password in cleartext in the TndAddNspTmp.bat file, which could allow local users to gain privileges." } ], "id": "CVE-2004-2436", "lastModified": "2024-11-20T23:53:21.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/displayvuln.php?osvdb_id=10408" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/12639/" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1011468" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11277" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/displayvuln.php?osvdb_id=10408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/12639/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1011468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17562" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-06-06 21:30
Modified
2024-11-21 00:31
Severity ?
Summary
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8:*:*:*:*:*:*:*", "matchCriteriaId": "F6B76576-ABB1-439E-80B0-0B5AAE14BA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "F52790F8-0D23-47F4-B7F7-6CB0F7B6EA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "443AB333-2C99-42FF-8F4E-A487BF588E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*", "matchCriteriaId": "8C339825-77F9-478A-B1F7-A297D5715396", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "E37161BE-6AF5-40E0-BD63-2C17431D8B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "477EE032-D183-478F-A2BF-6165277A7414", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3A0DD264-59A8-4B76-8D7F-138AEA7B1912", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "062DB370-929D-4FE1-A925-2FB5706C9409", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0D7957A4-D763-488F-B2B1-E00F428AD1AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F5A6578-902D-4D9F-AB19-C6484E878CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E2E79928-E5E2-42E5-9E09-58ADF9E76A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7587982-C722-4754-8744-8C7D43E191B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "71D3160D-539D-4E26-8B0B-C372315EE700", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "52C533CA-ACB7-4C0F-98E2-B5E51E24A554", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD2FE1C-8894-41EC-B686-932F0ACC41C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4996345-E5B0-42E2-8592-41B9BC805740", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7D938FC-E8E6-4709-BF6D-EF4833AF7D7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_antivirus:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "538F7CEC-D8A8-444F-9A9C-D1FF01EA7450", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "714BCFBA-B843-4C14-AA78-F7CF17899D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C61D9546-7619-465B-B3CA-C60218CD574B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "59035C39-14BA-4874-8874-75AA52D9AA38", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4292DD3A-6B79-43E0-8D2F-267375A3CBF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:integrated_threat_management:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C167CC34-95AE-45CD-A1CE-64FF738DE25E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "74F3CAC8-447B-467B-87C1-DD565B41515A", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B61BE84B-3BDA-489E-94E8-187A1B0F9281", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "285013A5-E058-4B2B-B8B6-1BFF72388589", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*", "matchCriteriaId": "5B4434A4-EE82-46A1-9293-345991515369", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "43CD3B48-C978-4FDB-B157-85F3E971446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DB54A16-5E56-46FC-A49C-56C98C0B8F1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*", "matchCriteriaId": "47C10BA4-B241-4F65-8FA1-AD88266C03B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*", "matchCriteriaId": "253A8082-9AE4-4049-A1D0-B7ACB5C2E8D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el motor antivirus anterior a la actualizaci\u00f3n de contenido 30.6 de m\u00faltiples productos CA (antiguamente Computer Associates) permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un valor largo no v\u00e1lido del campo coffFiles en un fichero .CAB." } ], "id": "CVE-2007-2864", "lastModified": "2024-11-21T00:31:50.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-06-06T21:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25570" }, { "source": "cve@mitre.org", "url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/105105" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/35245" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/470602/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/470754/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24330" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018199" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2072" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-035.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/105105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/35245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/470602/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/470754/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34737" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-10-13 10:30
Modified
2024-11-21 01:07
Severity ?
Summary
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:anti-virus:2007:8:*:*:*:*:*:*", "matchCriteriaId": "C469EBBE-EE96-4CED-BD8C-36461750C6A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus:2008:*:*:*:*:*:*:*", "matchCriteriaId": "9C5E892B-0EE8-4B76-97B8-0BAF17E83F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "607CCBDA-7288-4496-A7ED-EF6DED40CA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:r8:*:*:*:*:*:*:*", "matchCriteriaId": "11BCD267-E8CE-4A97-B769-5F4CAF9830D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "865B7BD2-3AD1-41CA-842B-47BC4F1426DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*", "matchCriteriaId": "0E2FA702-184A-44FF-8DEA-7811804EE175", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "D301B65D-A20B-4991-A0D8-DFE3363F162B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A08C715-A351-466D-99EC-006C106A3366", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8:*:*:*:*:*:*:*", "matchCriteriaId": "05185A74-8484-419D-A3CE-8603928AF0DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "52C533CA-ACB7-4C0F-98E2-B5E51E24A554", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_integrated_threat_management:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8D5F0-9606-4BBA-B7F9-ACD089B84DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "3DDF2EE3-753B-4C7E-84EF-144FA5986A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69184A5E-4FA9-4896-B6E8-1B9D4D62D099", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "F30C4FF9-DB76-4B3F-9582-752097B3D521", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "285013A5-E058-4B2B-B8B6-1BFF72388589", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0FF55705-42ED-4503-8534-FDEA365E84E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB548763-E1A7-4DB1-BE86-ED5AA1CA81BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r11:*:*:*:*:*:*:*", "matchCriteriaId": "6B28429A-F343-4BE8-A94D-5A5AC3F6258C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFF64064-1C35-4888-BBC2-52F68EF9517F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:secure_content_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DADD1E6-3454-4C1E-AD46-82D79CB8F528", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E02DA21-B25B-4626-BFDC-61AA8AF3537E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*", "matchCriteriaId": "5B4434A4-EE82-46A1-9293-345991515369", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "43CD3B48-C978-4FDB-B157-85F3E971446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus:2009:*:*:*:*:*:*:*", "matchCriteriaId": "6050CADE-7BAF-45B7-A031-F70558C7CE44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_for_the_enterprise:r8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0186ADA-0E20-4E14-B9D5-19CDFC1BD98F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_gateway:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD75FF0F-A36C-40AF-A99E-1596A6A6FE2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_plus:2009:*:*:*:*:*:*:*", "matchCriteriaId": "BED8CEF9-6AEC-4771-98F7-051E4B3E0848", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_for_windows_client_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "5603FDAD-A347-4A44-BC45-1ADC44601D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_for_windows_server_component:*:*:*:*:*:*:*:*", "matchCriteriaId": "5086D7CF-EBAB-4E30-98E0-0D276CC1C707", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:common_services:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7FAD043E-3ABE-46D7-AD17-A68858692A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_anti-virus_gateway:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C13B0E1-DCEE-46E5-81A3-C08C07C58B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_anti-virus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "257CC950-F1BB-4D0A-9B05-98A58DB67532", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_ez_antivirus:r7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0A641A2-4147-4C41-B102-18417ECA9339", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "29FEABEE-DC17-4620-B088-B24249865931", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D10B864B-AA39-4702-A42B-F33BAF2D8059", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DB54A16-5E56-46FC-A49C-56C98C0B8F1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:gateway_security:r8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B44F941C-83DC-4EDA-B258-C35F5EDA819E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_2008:*:*:*:*:*:*:*:*", "matchCriteriaId": "0281F80B-CF9C-482D-B7A9-3B2651BD0567", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_plus_2008:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F7E184-EA23-487C-83ED-65CF8DD2DB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_plus_2009:*:*:*:*:*:*:*:*", "matchCriteriaId": "951062B1-C72B-4EAF-BA54-6986434036FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*", "matchCriteriaId": "47C10BA4-B241-4F65-8FA1-AD88266C03B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*", "matchCriteriaId": "253A8082-9AE4-4049-A1D0-B7ACB5C2E8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r3.1:*:*:*:*:*:*:*", "matchCriteriaId": "CC845898-3D77-4793-971E-5E1555ED9CDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager:8.1:*:enterprise:*:*:*:*:*", "matchCriteriaId": "0115D81C-2CA2-424C-BE4B-0896C9ADA68E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager:r8:*:enterprise:*:*:*:*:*", "matchCriteriaId": "A38801CD-167E-408E-89BD-52BB1B89041B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager_total_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6AEE8BC-8D0E-464F-88B7-5C2C2D372AFA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8713893-59CE-486A-9262-E755A8F2D58C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente arclib en el motor Anti-Virus en CA Anti-Virus para Enterprise (formalmente eTrust Antivirus) v7.1 hasta v8.1; Anti-Virus 2007 (v8) hasta 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) hasta Plus 2009; y otros productos CA permite a atacantes remotos causar una denegaci\u00f3n de servicio y ejecutar probablemente c\u00f3digo de su elecci\u00f3n a trav\u00e9s del archivo RAR manipulado que provoca una corrupci\u00f3n de la memoria din\u00e1mica, una vulnerabilidad diferente que CVE-2009-3588." } ], "id": "CVE-2009-3587", "lastModified": "2024-11-21T01:07:44.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-10-13T10:30:00.610", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://osvdb.org/58691" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36976" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36653" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1022999" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/58691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1022999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53697" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-08-23 04:00
Modified
2024-11-21 00:00
Severity ?
Summary
Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "27A14CFE-F64B-478F-938F-9BFABDC1519E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:adviseit:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C841D8C5-1D71-49C8-ACE0-EED420DA4BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "7F206D15-FF0D-400E-9727-5DA6C07B57EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9688C248-2815-4386-AF03-13B2F000BC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "EC489ECB-30FB-4067-BF23-A8614FE50CB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "7B328CD3-30B5-4C1F-9BC3-511E48E832EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA67A49C-688A-4B6E-8B90-BEC937FCEE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "076561DB-925A-41BA-A444-D4484FA87227", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E3FE1453-0ECA-459B-8F23-776DF90617D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "50055C0C-3B7E-452D-A5FC-C618D0CC61B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D1D4FBE7-1B60-49AE-B5CD-FA1783454D75", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE46A9BF-C703-4A90-98A4-0211E909DFC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C03E1D5A-61EC-4B9E-96B1-69015D9210F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "08594EFB-E04B-42E8-BE00-C3ACDB62BA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "42F4E5D9-52F6-4A60-95AD-B57101644039", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "DCD39CAF-7164-4E0E-874A-213A4CB57D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "C8B5DC7A-C8E1-4E7D-8B58-7063B2F7CBCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6256DDC-50D7-489F-A04D-763AC41E6711", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9AD68320-7B1C-4651-ADA3-FD6AB599D375", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9FDBE82-E553-4504-A347-9C181B9B59FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A600F40-3E4D-4976-B82B-D7005CC4605C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*", "matchCriteriaId": "3696554E-AC8B-4028-81EA-A5BF9D7026EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*", "matchCriteriaId": "AE772B0B-9B5A-4768-B3F5-D6195ACE90AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "358E054A-2298-486B-88A4-44AB6864904E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9EC742EE-03C6-4BDC-AEF8-03609D6498E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBFCD53C-9536-4A62-B5A5-DAA8FFCA611F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_management_portal:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "435570CC-A9E2-4B7C-BC6A-7AC45223ECC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_management_portal:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "562569CE-C9AD-4D8C-ACCE-CAC9FF0EF8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB83D7E3-D798-45C5-BCC5-805B56D87CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_performance_management:2.4:sp3:openvms:*:*:*:*:*", "matchCriteriaId": "B46E7F96-99DF-42BA-B6D9-B625AB973850", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "53C2C33D-8403-4C75-8A52-713393FE408F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D293FB82-D21B-4BDD-A511-B994B557032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "90FF8920-8E4E-4369-96A8-954ECC05D0A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "173467CF-3871-49BA-B54A-27BA492F8433", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6AE0157-B6C9-4112-A3A6-5B040B19D4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "B7D03F79-22E5-49A3-AB05-14F8EDB04D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BAB1CA3-B423-4656-9532-29D02917C2BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7352EEC1-8FA1-431F-9A92-B0AA8B17F2E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "52933E5F-06B7-45E2-B8E5-9B25351E67A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "8A5FFBD6-2820-43D6-B945-FBFD6F6CFD72", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E17048CC-F3C9-47BC-87DE-4D431BC7E1C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2799F9BF-4C19-4268-AE41-03E9D1994CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AA4FB17-296A-4D26-9491-B7C151C45235", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2C5704D-3337-4351-872B-AF987DC39BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF2305-24CF-48F7-841E-63400CF25B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "96FE3512-D29B-4392-8DF8-B3B3A1F521BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9798A112-CE4D-435D-B80D-E4A4C7209A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "541D4956-3E82-4FA7-B18A-37D383D987A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "E836C2F1-2E93-4D4B-B0C3-3264762B26BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "18F48B87-E943-4915-83D2-5F08BD6D1825", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B42FDB59-00C8-4D6A-B6F0-C880E9C3F1D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "3A07DB6F-666C-4D87-9F7A-B17BE7454E4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:3.5:*:websphere_mq:*:*:*:*:*", "matchCriteriaId": "0FE2A55B-A89D-470E-8E9E-4B1B0FB1C4C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*", "matchCriteriaId": "DA6C17EE-38A9-4E8E-92E3-14D57E4BB546", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "A4F96A84-A69D-4017-A27D-09C7B95BA696", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "7FAD2FF7-1878-49F7-8F44-4E7DC4471F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*", "matchCriteriaId": "62B98B62-F00C-4F3E-B891-18AD04A37725", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*", "matchCriteriaId": "15726391-DF79-4EDE-AE6E-9D7B7E0EB654", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "16C98B61-52A4-4A67-BABA-B83AF6C7851C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*", "matchCriteriaId": "24BF5923-42E7-403E-81F0-D3136C58ECE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets." } ], "id": "CVE-2005-2669", "lastModified": "2024-11-21T00:00:06.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-23T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/16513" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/18917" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14623" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/16513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/18917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-10-13 10:30
Modified
2024-11-21 01:07
Severity ?
Summary
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:anti-virus:2007:8:*:*:*:*:*:*", "matchCriteriaId": "C469EBBE-EE96-4CED-BD8C-36461750C6A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus:2008:*:*:*:*:*:*:*", "matchCriteriaId": "9C5E892B-0EE8-4B76-97B8-0BAF17E83F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "607CCBDA-7288-4496-A7ED-EF6DED40CA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:r8:*:*:*:*:*:*:*", "matchCriteriaId": "11BCD267-E8CE-4A97-B769-5F4CAF9830D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "865B7BD2-3AD1-41CA-842B-47BC4F1426DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*", "matchCriteriaId": "0E2FA702-184A-44FF-8DEA-7811804EE175", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "D301B65D-A20B-4991-A0D8-DFE3363F162B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A08C715-A351-466D-99EC-006C106A3366", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8:*:*:*:*:*:*:*", "matchCriteriaId": "05185A74-8484-419D-A3CE-8603928AF0DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "52C533CA-ACB7-4C0F-98E2-B5E51E24A554", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_integrated_threat_management:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8D5F0-9606-4BBA-B7F9-ACD089B84DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "3DDF2EE3-753B-4C7E-84EF-144FA5986A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69184A5E-4FA9-4896-B6E8-1B9D4D62D099", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "F30C4FF9-DB76-4B3F-9582-752097B3D521", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "285013A5-E058-4B2B-B8B6-1BFF72388589", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0FF55705-42ED-4503-8534-FDEA365E84E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB548763-E1A7-4DB1-BE86-ED5AA1CA81BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r11:*:*:*:*:*:*:*", "matchCriteriaId": "6B28429A-F343-4BE8-A94D-5A5AC3F6258C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:network_and_systems_management:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFF64064-1C35-4888-BBC2-52F68EF9517F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:secure_content_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DADD1E6-3454-4C1E-AD46-82D79CB8F528", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E02DA21-B25B-4626-BFDC-61AA8AF3537E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*", "matchCriteriaId": "5B4434A4-EE82-46A1-9293-345991515369", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "43CD3B48-C978-4FDB-B157-85F3E971446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus:2009:*:*:*:*:*:*:*", "matchCriteriaId": "6050CADE-7BAF-45B7-A031-F70558C7CE44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_for_the_enterprise:r8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0186ADA-0E20-4E14-B9D5-19CDFC1BD98F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_gateway:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD75FF0F-A36C-40AF-A99E-1596A6A6FE2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:anti-virus_plus:2009:*:*:*:*:*:*:*", "matchCriteriaId": "BED8CEF9-6AEC-4771-98F7-051E4B3E0848", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_for_windows_client_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "5603FDAD-A347-4A44-BC45-1ADC44601D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_for_windows_server_component:*:*:*:*:*:*:*:*", "matchCriteriaId": "5086D7CF-EBAB-4E30-98E0-0D276CC1C707", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:common_services:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7FAD043E-3ABE-46D7-AD17-A68858692A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_anti-virus_gateway:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C13B0E1-DCEE-46E5-81A3-C08C07C58B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_anti-virus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "257CC950-F1BB-4D0A-9B05-98A58DB67532", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_ez_antivirus:r7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0A641A2-4147-4C41-B102-18417ECA9339", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "29FEABEE-DC17-4620-B088-B24249865931", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D10B864B-AA39-4702-A42B-F33BAF2D8059", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DB54A16-5E56-46FC-A49C-56C98C0B8F1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:gateway_security:r8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B44F941C-83DC-4EDA-B258-C35F5EDA819E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_2008:*:*:*:*:*:*:*:*", "matchCriteriaId": "0281F80B-CF9C-482D-B7A9-3B2651BD0567", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_plus_2008:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F7E184-EA23-487C-83ED-65CF8DD2DB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:internet_security_suite_plus_2009:*:*:*:*:*:*:*:*", "matchCriteriaId": "951062B1-C72B-4EAF-BA54-6986434036FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*", "matchCriteriaId": "47C10BA4-B241-4F65-8FA1-AD88266C03B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*", "matchCriteriaId": "253A8082-9AE4-4049-A1D0-B7ACB5C2E8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r3.1:*:*:*:*:*:*:*", "matchCriteriaId": "CC845898-3D77-4793-971E-5E1555ED9CDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager:8.1:*:enterprise:*:*:*:*:*", "matchCriteriaId": "0115D81C-2CA2-424C-BE4B-0896C9ADA68E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager:r8:*:enterprise:*:*:*:*:*", "matchCriteriaId": "A38801CD-167E-408E-89BD-52BB1B89041B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:threat_manager_total_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6AEE8BC-8D0E-464F-88B7-5C2C2D372AFA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:arcserve_backup:r12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "0486108C-E36C-4746-919E-C760E10EBAE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:arcserve_backup:r12.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "CD2F60F0-E8B8-46E6-932E-DF9F4457B47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8713893-59CE-486A-9262-E755A8F2D58C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:arcserve_backup:r11.5:*:*:*:*:*:*:*", "matchCriteriaId": "D8275AC1-81C5-4D9F-A61B-1A908BDDE0F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587." }, { "lang": "es", "value": "Vulnerabilidad inespec\u00edfica en el componente arclib en el motor antivirus en CA Anti-Virus para empresas (anteriormente eTrust Antivirus) desde v7.1 hasta r8.1; Anti-Virus desde 2007 (v8) hasta 2009; eTrust EZ Antivirus r7.1; Internet Security Suite desde 2007 (v3) hasta Plus 2009; y otros productos de CA permite a atacantes remotos producir una denegaci\u00f3n de servicio a trav\u00e9s de un archivo RAR manipulado que inicia la corrupci\u00f3n de la pila, una vulnerabilidad diferente que CVE-2009-3587." } ], "id": "CVE-2009-3588", "lastModified": "2024-11-21T01:07:44.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-10-13T10:30:00.627", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36976" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36653" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1022999" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "source": "cve@mitre.org", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507068/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1022999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53698" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-26 00:30
Modified
2024-11-21 00:24
Severity ?
Summary
Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "27A14CFE-F64B-478F-938F-9BFABDC1519E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "7F206D15-FF0D-400E-9727-5DA6C07B57EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA67A49C-688A-4B6E-8B90-BEC937FCEE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "FFD847AD-8AD1-40C1-9582-CC234D900CEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "076561DB-925A-41BA-A444-D4484FA87227", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E3FE1453-0ECA-459B-8F23-776DF90617D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "50055C0C-3B7E-452D-A5FC-C618D0CC61B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D1D4FBE7-1B60-49AE-B5CD-FA1783454D75", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE46A9BF-C703-4A90-98A4-0211E909DFC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C03E1D5A-61EC-4B9E-96B1-69015D9210F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "08594EFB-E04B-42E8-BE00-C3ACDB62BA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6256DDC-50D7-489F-A04D-763AC41E6711", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9AD68320-7B1C-4651-ADA3-FD6AB599D375", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9FDBE82-E553-4504-A347-9C181B9B59FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A600F40-3E4D-4976-B82B-D7005CC4605C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*", "matchCriteriaId": "3696554E-AC8B-4028-81EA-A5BF9D7026EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*", "matchCriteriaId": "AE772B0B-9B5A-4768-B3F5-D6195ACE90AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "358E054A-2298-486B-88A4-44AB6864904E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9EC742EE-03C6-4BDC-AEF8-03609D6498E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBFCD53C-9536-4A62-B5A5-DAA8FFCA611F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB83D7E3-D798-45C5-BCC5-805B56D87CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "53C2C33D-8403-4C75-8A52-713393FE408F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D293FB82-D21B-4BDD-A511-B994B557032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "90FF8920-8E4E-4369-96A8-954ECC05D0A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "173467CF-3871-49BA-B54A-27BA492F8433", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6AE0157-B6C9-4112-A3A6-5B040B19D4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "B7D03F79-22E5-49A3-AB05-14F8EDB04D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BAB1CA3-B423-4656-9532-29D02917C2BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7352EEC1-8FA1-431F-9A92-B0AA8B17F2E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "52933E5F-06B7-45E2-B8E5-9B25351E67A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "8A5FFBD6-2820-43D6-B945-FBFD6F6CFD72", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E17048CC-F3C9-47BC-87DE-4D431BC7E1C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2799F9BF-4C19-4268-AE41-03E9D1994CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AA4FB17-296A-4D26-9491-B7C151C45235", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2C5704D-3337-4351-872B-AF987DC39BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF2305-24CF-48F7-841E-63400CF25B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "96FE3512-D29B-4392-8DF8-B3B3A1F521BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9798A112-CE4D-435D-B80D-E4A4C7209A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "541D4956-3E82-4FA7-B18A-37D383D987A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "E836C2F1-2E93-4D4B-B0C3-3264762B26BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "18F48B87-E943-4915-83D2-5F08BD6D1825", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B42FDB59-00C8-4D6A-B6F0-C880E9C3F1D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "3A07DB6F-666C-4D87-9F7A-B17BE7454E4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*", "matchCriteriaId": "DA6C17EE-38A9-4E8E-92E3-14D57E4BB546", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "A4F96A84-A69D-4017-A27D-09C7B95BA696", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "7FAD2FF7-1878-49F7-8F44-4E7DC4471F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*", "matchCriteriaId": "62B98B62-F00C-4F3E-B891-18AD04A37725", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*", "matchCriteriaId": "15726391-DF79-4EDE-AE6E-9D7B7E0EB654", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "16C98B61-52A4-4A67-BABA-B83AF6C7851C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*", "matchCriteriaId": "24BF5923-42E7-403E-81F0-D3136C58ECE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en Message Queuing Server (Cam.exe) en CA (formalmente Computer Associates) Message Queuing (CAM / CAFT) software anterior a 1.11 construccion 54_4 sobre Windows y NetWare, utilizado en CA Advantage Data Transport, eTrust Admin, ciertos productos BrightStor, ciertos productos CleverPath, y ciertos productos Unicenter, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un mensaje manipulado en el puerto TCP 3104." } ], "id": "CVE-2007-0060", "lastModified": "2024-11-21T00:24:52.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-26T00:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/26190" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.iss.net/threats/272.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/474602/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/25051" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1018449" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2638" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32234" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/26190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.iss.net/threats/272.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/474602/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/25051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1018449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32234" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-26 00:30
Modified
2024-11-21 00:34
Severity ?
Summary
arclib.dll before 7.3.0.9 in CA Anti-Virus (formerly eTrust Antivirus) 8 and certain other CA products allows remote attackers to cause a denial of service (infinite loop and loss of antivirus functionality) via an invalid "previous listing chunk number" field in a CHM file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:anti-spyware:2007:*:*:*:*:*:*:*", "matchCriteriaId": "385B8B52-F5EA-4E13-A7EE-C2D1B694C785", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCCEAF14-75C0-4B4E-BACB-B84D69A276BA", "versionEndIncluding": "8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "ACA94302-1501-4744-8296-6A6CD763DC6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "607CCBDA-7288-4496-A7ED-EF6DED40CA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8:*:*:*:*:*:*:*", "matchCriteriaId": "F6B76576-ABB1-439E-80B0-0B5AAE14BA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti-virus_for_the_enterprise:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FE175BB8-DF9B-4DA0-AD2F-885CC13BB812", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:anti_virus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C02D3C8C-D739-4538-8660-1ED99FFE673F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:antispyware_for_the_enterprise:8:*:*:*:*:*:*:*", "matchCriteriaId": "4545DACA-EFD3-4764-897B-844C010B49E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:antispyware_for_the_enterprise:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "877B83A0-A399-4B1A-9324-481DF04A104C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:antivirus_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B1A8FDA-3780-440A-BDAB-3BE11BF76951", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "F52790F8-0D23-47F4-B7F7-6CB0F7B6EA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "E37161BE-6AF5-40E0-BD63-2C17431D8B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "477EE032-D183-478F-A2BF-6165277A7414", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_arcserve_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "D546DEE1-E8A0-4321-AE5E-1DEEE719FC06", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "78AA54EA-DAF1-4635-AA1B-E2E49C4BB597", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brigthstor_arcserve_client_for_windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "672B430D-3BE7-4BA0-A0A6-7ABED96DE892", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:11:*:*:*:*:*:*:*", "matchCriteriaId": "0E2FA702-184A-44FF-8DEA-7811804EE175", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:common_services:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "D301B65D-A20B-4991-A0D8-DFE3363F162B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus:8:*:*:*:*:*:*:*", "matchCriteriaId": "05185A74-8484-419D-A3CE-8603928AF0DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DD2FE1C-8894-41EC-B686-932F0ACC41C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7D938FC-E8E6-4709-BF6D-EF4833AF7D7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_antivirus:7:*:*:*:*:*:*:*", "matchCriteriaId": "463CBA1F-89DC-4D24-8F27-276406D423ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:1:*:*:*:*:*:*:*", "matchCriteriaId": "330B61D3-302D-46A7-92F2-DF68B0BBB1B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:2:*:*:*:*:*:*:*", "matchCriteriaId": "76D8B409-194E-4588-AE69-6E42090C443C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_ez_armor:3:*:*:*:*:*:*:*", "matchCriteriaId": "7A1FDED6-7616-4F92-B660-47BE99EAD4E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_internet_security_suite:1:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC5201-F780-42BD-B859-163E79E65FE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_internet_security_suite:2:*:*:*:*:*:*:*", "matchCriteriaId": "B5EF0113-DBFB-41F8-AE3F-B4B8C77ED159", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C00221F9-33EE-4221-A5B3-A1AE42A7B9D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "3DDF2EE3-753B-4C7E-84EF-144FA5986A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:internet_security_suite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "285013A5-E058-4B2B-B8B6-1BFF72388589", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:secure_content_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DADD1E6-3454-4C1E-AD46-82D79CB8F528", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:secure_content_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E02DA21-B25B-4626-BFDC-61AA8AF3537E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:threat_manager:8:*:*:*:*:*:*:*", "matchCriteriaId": "BE8EE8B0-CAA6-46CB-8A8E-66F3FD49FEE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11:*:*:*:*:*:*:*", "matchCriteriaId": "5B4434A4-EE82-46A1-9293-345991515369", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "43CD3B48-C978-4FDB-B157-85F3E971446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*", "matchCriteriaId": "6E236148-4A57-4FDC-A072-A77D3DD2DB53", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D10B864B-AA39-4702-A42B-F33BAF2D8059", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r2:*:*:*:*:*:*:*", "matchCriteriaId": "47C10BA4-B241-4F65-8FA1-AD88266C03B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:protection_suites:r3:*:*:*:*:*:*:*", "matchCriteriaId": "253A8082-9AE4-4049-A1D0-B7ACB5C2E8D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "arclib.dll before 7.3.0.9 in CA Anti-Virus (formerly eTrust Antivirus) 8 and certain other CA products allows remote attackers to cause a denial of service (infinite loop and loss of antivirus functionality) via an invalid \"previous listing chunk number\" field in a CHM file." }, { "lang": "es", "value": "arclib.dll anterior a 7.3.0.9 en CA Anti-Virus (formalmente eTrust Antivirus) 8 y otros ciertos productos CA permiten a atacantes remotos provocar denegaci\u00f3n de servicio (bucles infinitos y perdida de funcionalidad antivirus) a trav\u00e9s de un campo\"listado previo de un trozo de n\u00famero\" en un cierto archivo CHM." } ], "id": "CVE-2007-3875", "lastModified": "2024-11-21T00:34:17.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-26T00:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26155" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp" }, { "source": "cve@mitre.org", "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/474601/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/474605/100/100/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25049" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018450" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2639" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/474601/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/474605/100/100/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2639" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35573" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-08-23 04:00
Modified
2024-11-21 00:00
Severity ?
Summary
Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "27A14CFE-F64B-478F-938F-9BFABDC1519E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:adviseit:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C841D8C5-1D71-49C8-ACE0-EED420DA4BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "7F206D15-FF0D-400E-9727-5DA6C07B57EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9688C248-2815-4386-AF03-13B2F000BC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "EC489ECB-30FB-4067-BF23-A8614FE50CB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:1.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "7B328CD3-30B5-4C1F-9BC3-511E48E832EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA67A49C-688A-4B6E-8B90-BEC937FCEE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "076561DB-925A-41BA-A444-D4484FA87227", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E3FE1453-0ECA-459B-8F23-776DF90617D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "50055C0C-3B7E-452D-A5FC-C618D0CC61B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D1D4FBE7-1B60-49AE-B5CD-FA1783454D75", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE46A9BF-C703-4A90-98A4-0211E909DFC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C03E1D5A-61EC-4B9E-96B1-69015D9210F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "08594EFB-E04B-42E8-BE00-C3ACDB62BA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "42F4E5D9-52F6-4A60-95AD-B57101644039", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "DCD39CAF-7164-4E0E-874A-213A4CB57D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:messaging:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "C8B5DC7A-C8E1-4E7D-8B58-7063B2F7CBCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6256DDC-50D7-489F-A04D-763AC41E6711", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9AD68320-7B1C-4651-ADA3-FD6AB599D375", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9FDBE82-E553-4504-A347-9C181B9B59FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A600F40-3E4D-4976-B82B-D7005CC4605C", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*", "matchCriteriaId": "3696554E-AC8B-4028-81EA-A5BF9D7026EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*", "matchCriteriaId": "AE772B0B-9B5A-4768-B3F5-D6195ACE90AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "358E054A-2298-486B-88A4-44AB6864904E", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9EC742EE-03C6-4BDC-AEF8-03609D6498E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBFCD53C-9536-4A62-B5A5-DAA8FFCA611F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_management_portal:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "435570CC-A9E2-4B7C-BC6A-7AC45223ECC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_management_portal:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "562569CE-C9AD-4D8C-ACCE-CAC9FF0EF8CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C8A1C-0A55-4CA5-9BB6-2D03EFCFE699", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EFA39E3-A614-4A64-B29C-86D6F12F1557", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB83D7E3-D798-45C5-BCC5-805B56D87CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_performance_management:2.4:sp3:openvms:*:*:*:*:*", "matchCriteriaId": "B46E7F96-99DF-42BA-B6D9-B625AB973850", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "53C2C33D-8403-4C75-8A52-713393FE408F", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D293FB82-D21B-4BDD-A511-B994B557032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "90FF8920-8E4E-4369-96A8-954ECC05D0A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "173467CF-3871-49BA-B54A-27BA492F8433", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6AE0157-B6C9-4112-A3A6-5B040B19D4FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "B7D03F79-22E5-49A3-AB05-14F8EDB04D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BAB1CA3-B423-4656-9532-29D02917C2BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7352EEC1-8FA1-431F-9A92-B0AA8B17F2E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "52933E5F-06B7-45E2-B8E5-9B25351E67A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "8A5FFBD6-2820-43D6-B945-FBFD6F6CFD72", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E17048CC-F3C9-47BC-87DE-4D431BC7E1C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2799F9BF-4C19-4268-AE41-03E9D1994CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AA4FB17-296A-4D26-9491-B7C151C45235", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2C5704D-3337-4351-872B-AF987DC39BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF2305-24CF-48F7-841E-63400CF25B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "96FE3512-D29B-4392-8DF8-B3B3A1F521BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9798A112-CE4D-435D-B80D-E4A4C7209A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "541D4956-3E82-4FA7-B18A-37D383D987A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "E836C2F1-2E93-4D4B-B0C3-3264762B26BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "18F48B87-E943-4915-83D2-5F08BD6D1825", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B42FDB59-00C8-4D6A-B6F0-C880E9C3F1D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "3A07DB6F-666C-4D87-9F7A-B17BE7454E4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:3.5:*:websphere_mq:*:*:*:*:*", "matchCriteriaId": "0FE2A55B-A89D-470E-8E9E-4B1B0FB1C4C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*", "matchCriteriaId": "DA6C17EE-38A9-4E8E-92E3-14D57E4BB546", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "A4F96A84-A69D-4017-A27D-09C7B95BA696", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "7FAD2FF7-1878-49F7-8F44-4E7DC4471F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*", "matchCriteriaId": "62B98B62-F00C-4F3E-B891-18AD04A37725", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*", "matchCriteriaId": "15726391-DF79-4EDE-AE6E-9D7B7E0EB654", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "16C98B61-52A4-4A67-BABA-B83AF6C7851C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*", "matchCriteriaId": "24BF5923-42E7-403E-81F0-D3136C58ECE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors." } ], "id": "CVE-2005-2668", "lastModified": "2024-11-21T00:00:06.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-23T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/16513" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/619988" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/18916" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14622" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/16513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/619988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/18916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/1482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }