{"vuid":"VU#619988","idnumber":"619988","name":"Computer Associates Message Queuing software vulnerable to buffer overflows","keywords":["Computer Associates Message Queuing software","CA","CAM","CAFT","buffer overflow","arbitrary code execution","privilege escalation","CAID 32919"],"overview":"Computer Associates Message Queuing software contains buffer overflow conditions, which may allow a remote attacker to execute arbitrary code with elevated privileges.","clean_desc":"Computer Associates Message Queuing (CAM / CAFT) is a software component that provides messaging services. CAM provides a \"store and forward\" messaging framework for applications, and CAFT is an application that utilizes CAM for file transfers. Multiple Computer Associates applications use CAM / CAFT for their messaging requirements. According to the Computer Associates SupportConnect document, the following applications use CAM / CAFT: AdviseIT 2.4\nAdvantage™ Data Transport 3.0\nBrightStor® SAN Manager 1.1, 1.1 SP1, 1.1 SP2, 11.1\nBrightStor® Portal 11.1\nCleverPath™ OLAP 5.1\nCleverPath™ ECM 3.5\nCleverPath™ Predictive Analysis Server 2.0, 3.0\nCleverPath™ Aion 10.0\neTrust™ Admin 2.01, 2.04, 2.07, 2.09, 8.0, 8.1\nUnicenter Performance Management for OpenVMS r2.4 SP3\nUnicenter® Application Performance Monitor 3.0, 3.5\nUnicenter® Asset Management 3.1, 3.2, 3.2 SP1, 3.2 SP2, 4.0, 4.0 SP1\nUnicenter® Data Transport Option 2.0\nUnicenter® Enterprise Job Manager 1.0 SP1, 1.0 SP2\nUnicenter® Jasmine 3.0\nUnicenter® Management for WebSphere MQ 3.5\nUnicenter® Management for Microsoft Exchange 4.0, 4.1\nUnicenter® Management for Lotus Notes/Domino 4.0\nUnicenter® Management for Web Servers 5, 5.0.1\nUnicenter® NSM 3.0, 3.1\nUnicenter® NSM Wireless Network Management Option 3.0\nUnicenter® Remote Control 6.0, 6.0 SP1\nUnicenter® Service Level Management 3.0, 3.0.1, 3.0.2, 3.5\nUnicenter® Software Delivery 3.0, 3.1, 3.1 SP1, 3.1 SP2, 4.0, 4.0 SP1\nUnicenter® TNG 2.1, 2.2, 2.4, 2.4.2\nUnicenter® TNG JPN 2.2\nComputer Associates CAM / CAFT contains multiple buffer overflow conditions.","impact":"A remote attacker may be able to execute arbitrary code on the CAM / CAFT system with elevated privileges.","resolution":"Upgrade or patch\nPlease see the Computer Associates SupportConnect notice for fix availability.","workarounds":"","sysaffected":"","thanks":"Thanks to Computer Associates for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp","http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_faqs.asp","http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919","http://secunia.com/advisories/16513/","http://www.securityfocus.com/bid/14622","http://osvdb.org/displayvuln.php?osvdb_id=18916","http://securitytracker.com/alerts/2005/Aug/1014775.html","http://securitytracker.com/alerts/2005/Aug/1014774.html","http://securitytracker.com/alerts/2005/Aug/1014773.html","http://securitytracker.com/alerts/2005/Aug/1014772.html","http://securitytracker.com/alerts/2005/Aug/1014771.html","http://securitytracker.com/alerts/2005/Aug/1014770.html","http://securitytracker.com/alerts/2005/Aug/1014769.html","http://securitytracker.com/alerts/2005/Aug/1014768.html","http://securitytracker.com/alerts/2005/Aug/1014767.html","http://securitytracker.com/alerts/2005/Aug/1014766.html","http://securitytracker.com/alerts/2005/Aug/1014765.html","http://securitytracker.com/alerts/2005/Aug/1014764.html","http://securitytracker.com/alerts/2005/Aug/1014763.html","http://securitytracker.com/alerts/2005/Aug/1014761.html","http://securitytracker.com/alerts/2005/Aug/1014760.html","http://securitytracker.com/alerts/2005/Aug/1014756.html","http://www.securityfocus.com/bid/14623"],"cveids":["CVE-2005-2668"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-08-22T15:12:44Z","publicdate":"2005-08-19T00:00:00Z","datefirstpublished":"2005-08-23T20:03:04Z","dateupdated":"2005-10-21T13:41:04Z","revision":22,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"14","cam_attackeraccessrequired":"10","cam_scorecurrent":"13.125","cam_scorecurrentwidelyknown":"13.125","cam_scorecurrentwidelyknownexploited":"23.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.125,"vulnote":null}