ID

VAR-200508-0051


CVE

CVE-2005-2668


TITLE

Computer Associates Message Queuing software vulnerable to buffer overflows

Trust: 0.8

sources: CERT/CC: VU#619988

DESCRIPTION

Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors. This may allow an attacker to escalate their privileges to SYSTEM level. CA Unicenter Management Portal provides access to enterprise management information and various Unicenter management solutions such as personalized WEB interface. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: CA Various Products Message Queuing Vulnerabilities SECUNIA ADVISORY ID: SA16513 VERIFY ADVISORY: http://secunia.com/advisories/16513/ CRITICAL: Moderately critical IMPACT: Spoofing, DoS, System access WHERE: >From local network SOFTWARE: CA Unicenter TNG 2.x http://secunia.com/product/3206/ CA Unicenter Software Delivery 4.x http://secunia.com/product/5597/ CA Unicenter Software Delivery 3.x http://secunia.com/product/5596/ CA Unicenter Service Level Management 3.x http://secunia.com/product/5595/ CA Unicenter Remote Control 6.x http://secunia.com/product/2622/ CA Unicenter Performance Management for OpenVMS 2.x http://secunia.com/product/5573/ CA Unicenter Network and Systems Management (NSM) Wireless Network Management Option 3.x http://secunia.com/product/5594/ CA Unicenter Network and Systems Management (NSM) 3.x http://secunia.com/product/1683/ CA Unicenter Management for WebSphere MQ 3.x http://secunia.com/product/5590/ CA Unicenter Management for Web Servers 5.x http://secunia.com/product/5593/ CA Unicenter Management for Microsoft Exchange 4.x http://secunia.com/product/5591/ CA Unicenter Management for Lotus Notes/Domino 4.x http://secunia.com/product/5592/ CA Unicenter Jasmine 3.x http://secunia.com/product/5589/ CA Unicenter Enterprise Job Manager 1.x http://secunia.com/product/5588/ CA Unicenter Data Transport Option 2.x http://secunia.com/product/5587/ CA Unicenter Asset Management 4.x http://secunia.com/product/1682/ CA Unicenter Asset Management 3.x http://secunia.com/product/5586/ CA Unicenter Application Performance Monitor 3.x http://secunia.com/product/5585/ CA eTrust Admin 8.x http://secunia.com/product/5584/ CA eTrust Admin 2.x http://secunia.com/product/5583/ CA CleverPath Predictive Analysis Server 3.x http://secunia.com/product/5581/ CA CleverPath Predictive Analysis Server 2.x http://secunia.com/product/5580/ CA CleverPath OLAP 5.x http://secunia.com/product/5578/ CA CleverPath Enterprise Content Manager (ECM) 3.x http://secunia.com/product/5579/ CA CleverPath Aion 10.x http://secunia.com/product/5582/ CA BrightStor SAN Manager 11.x http://secunia.com/product/5576/ CA BrightStor SAN Manager 1.x http://secunia.com/product/5575/ CA BrightStor Portal 11.x http://secunia.com/product/5577/ CA Advantage Data Transport 3.x http://secunia.com/product/5574/ DESCRIPTION: Some vulnerabilities have been reported in various products within the CA Message Queuing (CAM / CAFT) software, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. 1) An unspecified error in the CAM service can be exploited to cause a DoS by sending specially crafted packets to the TCP port. 2) Unspecified boundary errors can be exploited to cause buffer overflows by sending specially crafted packets to the service. 3) An error can be exploited to spoof CAFT and execute arbitrary commands with escalated privileges. The vulnerabilities affect all versions of the CA Message Queuing software prior to versions 1.07 Build 220_13 and 1.11 Build 29_13. SOLUTION: Apply patches (see vendor advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: Computer Associates: http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2005-2668 // CERT/CC: VU#619988 // JVNDB: JVNDB-2005-000834 // BID: 14622 // VULHUB: VHN-13877 // PACKETSTORM: 39503

AFFECTED PRODUCTS

vendor:camodel:unicenter software deliveryscope:eqversion:4.0

Trust: 1.6

vendor:camodel:unicenter tngscope:eqversion:2.2

Trust: 1.6

vendor:broadcommodel:brightstor san managerscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:messagingscope:eqversion:1.7

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.9

Trust: 1.0

vendor:broadcommodel:brightstor san managerscope:eqversion:1.1

Trust: 1.0

vendor:broadcommodel:unicenter asset managementscope:eqversion:4.0

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.1

Trust: 1.0

vendor:broadcommodel:unicenter remote controlscope:eqversion:6.0

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.4

Trust: 1.0

vendor:broadcommodel:messagingscope:eqversion:1.5

Trust: 1.0

vendor:camodel:unicenter asset managementscope:eqversion:4.0

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:3.5

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:4.0

Trust: 1.0

vendor:broadcommodel:unicenter nsm wireless network management optionscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter data transport optionscope:eqversion:2.0

Trust: 1.0

vendor:broadcommodel:cleverpath olapscope:eqversion:5.1

Trust: 1.0

vendor:broadcommodel:adviseitscope:eqversion:2.4

Trust: 1.0

vendor:broadcommodel:unicenter software deliveryscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:cleverpath predictive analysis serverscope:eqversion:2.0

Trust: 1.0

vendor:broadcommodel:etrust adminscope:eqversion:8.1

Trust: 1.0

vendor:camodel:unicenter enterprise job managerscope:eqversion:1.0

Trust: 1.0

vendor:broadcommodel:unicenter management portalscope:eqversion:2.0

Trust: 1.0

vendor:broadcommodel:unicenter software deliveryscope:eqversion:4.0

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.2

Trust: 1.0

vendor:broadcommodel:etrust adminscope:eqversion:8.0

Trust: 1.0

vendor:broadcommodel:unicenter management portalscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:cleverpath aionscope:eqversion:10.0

Trust: 1.0

vendor:broadcommodel:unicenter asset managementscope:eqversion:3.2

Trust: 1.0

vendor:broadcommodel:unicenter jasminescope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.1

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.4

Trust: 1.0

vendor:broadcommodel:unicenter asset managementscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:advantage data transportscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.0.2

Trust: 1.0

vendor:broadcommodel:unicenter application performance monitorscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.4.2

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:4.1

Trust: 1.0

vendor:broadcommodel:unicenter performance managementscope:eqversion:2.4

Trust: 1.0

vendor:broadcommodel:cleverpath ecmscope:eqversion:3.5

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.0.1

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter application performance monitorscope:eqversion:3.5

Trust: 1.0

vendor:broadcommodel:cleverpath predictive analysis serverscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:3.0

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.7

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:5.0.1

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.5

Trust: 1.0

vendor:broadcommodel:brightstor portalscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:unicenter software deliveryscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:messagingscope:eqversion:1.11

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:5.0

Trust: 1.0

vendor:computer associatesmodel: - scope: - version: -

Trust: 0.8

vendor:camodel:message queuingscope:eqversion:1.05

Trust: 0.8

vendor:camodel:message queuingscope:eqversion:1.07 build 220_13 before

Trust: 0.8

vendor:camodel:message queuingscope:eqversion:1.11 build 29_13 before

Trust: 0.8

vendor:camodel:unicenter tngscope:eqversion:2.4.2

Trust: 0.6

vendor:camodel:unicenter tngscope:eqversion:2.1

Trust: 0.6

vendor:camodel:unicenter tngscope:eqversion:2.4

Trust: 0.6

vendor:camodel:unicenter software deliveryscope:eqversion:3.1

Trust: 0.6

vendor:computermodel:associates unicenter tngscope:eqversion:2.4.2

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.4

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.2

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.1

Trust: 0.3

vendor:computermodel:associates unicenter software delivery sp1scope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter software delivery sp2scope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter software delivery sp1scope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.0.2

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.0.1

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter remote control sp1scope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter remote controlscope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter performance management for openvms sp3scope:eqversion:2.4

Trust: 0.3

vendor:computermodel:associates unicenter nsm wireless network management optionscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter management portalscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter management portalscope:eqversion:2.0

Trust: 0.3

vendor:computermodel:associates unicenter management for websphere mqscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter management for web serversscope:eqversion:5.0.1

Trust: 0.3

vendor:computermodel:associates unicenter management for web serversscope:eqversion:5.0

Trust: 0.3

vendor:computermodel:associates unicenter management for microsoft exchangescope:eqversion:4.1

Trust: 0.3

vendor:computermodel:associates unicenter management for microsoft exchangescope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter management for lotus notes/dominoscope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter jasminescope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp2scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp1scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter data transport optionscope:eqversion:2.0

Trust: 0.3

vendor:computermodel:associates unicenter asset management sp1scope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter asset management sp2scope:eqversion:3.2

Trust: 0.3

vendor:computermodel:associates unicenter asset management sp1scope:eqversion:3.2

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:3.2

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter application performance monitorscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter application performance monitorscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.9

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.7

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.4

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.1

Trust: 0.3

vendor:computermodel:associates cleverpath predictive analysis serverscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates cleverpath predictive analysis serverscope:eqversion:2.0

Trust: 0.3

vendor:computermodel:associates cleverpath olapscope:eqversion:5.1

Trust: 0.3

vendor:computermodel:associates cleverpath ecmscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates cleverpath aionscope:eqversion:10.0

Trust: 0.3

vendor:computermodel:associates camscope:eqversion:1.11

Trust: 0.3

vendor:computermodel:associates camscope:eqversion:1.07

Trust: 0.3

vendor:computermodel:associates camscope:eqversion:1.05

Trust: 0.3

vendor:computermodel:associates brightstor san managerscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor san manager sp2scope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates brightstor san manager sp1scope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates brightstor san managerscope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates brightstor portalscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates adviseitscope:eqversion:2.4

Trust: 0.3

vendor:computermodel:associates advantage data transportscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates cam build 29 13scope:neversion:1.11

Trust: 0.3

vendor:computermodel:associates cam build 220 13scope:neversion:1.07

Trust: 0.3

sources: CERT/CC: VU#619988 // BID: 14622 // JVNDB: JVNDB-2005-000834 // CNNVD: CNNVD-200508-250 // NVD: CVE-2005-2668

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2668
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#619988
value: 13.13

Trust: 0.8

NVD: CVE-2005-2668
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200508-250
value: CRITICAL

Trust: 0.6

VULHUB: VHN-13877
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-2668
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-13877
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#619988 // VULHUB: VHN-13877 // JVNDB: JVNDB-2005-000834 // CNNVD: CNNVD-200508-250 // NVD: CVE-2005-2668

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-2668

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200508-250

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200508-250

CONFIGURATIONS

sources: JVNDB: JVNDB-2005-000834

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-13877

PATCH

title:camsecurity_noticeurl:http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp

Trust: 0.8

title:CA Unicenter CAM Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=146854

Trust: 0.6

sources: JVNDB: JVNDB-2005-000834 // CNNVD: CNNVD-200508-250

EXTERNAL IDS

db:BIDid:14622

Trust: 3.6

db:SECUNIAid:16513

Trust: 3.4

db:CERT/CCid:VU#619988

Trust: 3.3

db:NVDid:CVE-2005-2668

Trust: 2.8

db:OSVDBid:18916

Trust: 2.5

db:VUPENid:ADV-2005-1482

Trust: 1.7

db:SECTRACKid:1014756

Trust: 0.8

db:SECTRACKid:1014760

Trust: 0.8

db:SECTRACKid:1014761

Trust: 0.8

db:SECTRACKid:1014763

Trust: 0.8

db:SECTRACKid:1014764

Trust: 0.8

db:SECTRACKid:1014765

Trust: 0.8

db:SECTRACKid:1014766

Trust: 0.8

db:SECTRACKid:1014767

Trust: 0.8

db:SECTRACKid:1014768

Trust: 0.8

db:SECTRACKid:1014769

Trust: 0.8

db:SECTRACKid:1014770

Trust: 0.8

db:SECTRACKid:1014771

Trust: 0.8

db:SECTRACKid:1014772

Trust: 0.8

db:SECTRACKid:1014773

Trust: 0.8

db:SECTRACKid:1014774

Trust: 0.8

db:SECTRACKid:1014775

Trust: 0.8

db:BIDid:14623

Trust: 0.8

db:JVNDBid:JVNDB-2005-000834

Trust: 0.8

db:CNNVDid:CNNVD-200508-250

Trust: 0.7

db:EXPLOIT-DBid:16825

Trust: 0.1

db:PACKETSTORMid:83148

Trust: 0.1

db:SEEBUGid:SSVID-71327

Trust: 0.1

db:VULHUBid:VHN-13877

Trust: 0.1

db:PACKETSTORMid:39503

Trust: 0.1

sources: CERT/CC: VU#619988 // VULHUB: VHN-13877 // BID: 14622 // JVNDB: JVNDB-2005-000834 // PACKETSTORM: 39503 // CNNVD: CNNVD-200508-250 // NVD: CVE-2005-2668

REFERENCES

url:http://www.securityfocus.com/bid/14622

Trust: 3.3

url:http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp

Trust: 2.9

url:http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/619988

Trust: 2.5

url:http://secunia.com/advisories/16513

Trust: 2.5

url:http://www.osvdb.org/18916

Trust: 1.7

url:http://www.vupen.com/english/advisories/2005/1482

Trust: 1.7

url:http://secunia.com/advisories/16513/

Trust: 0.9

url:http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_faqs.asp

Trust: 0.8

url:http://osvdb.org/displayvuln.php?osvdb_id=18916

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014775.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014774.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014773.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014772.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014771.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014770.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014769.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014768.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014767.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014766.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014765.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014764.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014763.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014761.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014760.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014756.html

Trust: 0.8

url:http://www.securityfocus.com/bid/14623

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-2668

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2005/1482

Trust: 0.8

url:http://jvn.jp//cert/jvnvu619988/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2005-2668

Trust: 0.8

url:http://www.designfolks.com.au/karma/cam/

Trust: 0.3

url:http://www.ca.com/

Trust: 0.3

url:/archive/1/408817

Trust: 0.3

url:http://secunia.com/product/5586/

Trust: 0.1

url:http://secunia.com/product/5575/

Trust: 0.1

url:http://secunia.com/product/5581/

Trust: 0.1

url:http://secunia.com/product/5574/

Trust: 0.1

url:http://secunia.com/product/5585/

Trust: 0.1

url:http://secunia.com/product/5580/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/5595/

Trust: 0.1

url:http://secunia.com/product/5587/

Trust: 0.1

url:http://secunia.com/product/5594/

Trust: 0.1

url:http://secunia.com/product/5591/

Trust: 0.1

url:http://secunia.com/product/5583/

Trust: 0.1

url:http://secunia.com/product/5576/

Trust: 0.1

url:http://secunia.com/product/1682/

Trust: 0.1

url:http://secunia.com/product/5577/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/5590/

Trust: 0.1

url:http://secunia.com/product/5582/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/product/3206/

Trust: 0.1

url:http://secunia.com/product/5596/

Trust: 0.1

url:http://secunia.com/product/2622/

Trust: 0.1

url:http://secunia.com/product/5588/

Trust: 0.1

url:http://secunia.com/product/5584/

Trust: 0.1

url:http://secunia.com/product/5578/

Trust: 0.1

url:http://secunia.com/product/5573/

Trust: 0.1

url:http://secunia.com/product/5579/

Trust: 0.1

url:http://secunia.com/product/1683/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5589/

Trust: 0.1

url:http://secunia.com/product/5593/

Trust: 0.1

url:http://secunia.com/product/5592/

Trust: 0.1

url:http://secunia.com/product/5597/

Trust: 0.1

sources: CERT/CC: VU#619988 // VULHUB: VHN-13877 // BID: 14622 // JVNDB: JVNDB-2005-000834 // PACKETSTORM: 39503 // CNNVD: CNNVD-200508-250 // NVD: CVE-2005-2668

CREDITS

The discoverer of this vulnerability is currently unknown. The vendor disclosed this issue.

Trust: 0.3

sources: BID: 14622

SOURCES

db:CERT/CCid:VU#619988
db:VULHUBid:VHN-13877
db:BIDid:14622
db:JVNDBid:JVNDB-2005-000834
db:PACKETSTORMid:39503
db:CNNVDid:CNNVD-200508-250
db:NVDid:CVE-2005-2668

LAST UPDATE DATE

2024-08-14T13:40:04.616000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#619988date:2005-10-21T00:00:00
db:VULHUBid:VHN-13877date:2017-11-22T00:00:00
db:BIDid:14622date:2007-11-15T00:37:00
db:JVNDBid:JVNDB-2005-000834date:2008-11-21T00:00:00
db:CNNVDid:CNNVD-200508-250date:2021-04-08T00:00:00
db:NVDid:CVE-2005-2668date:2021-04-14T15:46:28.003

SOURCES RELEASE DATE

db:CERT/CCid:VU#619988date:2005-08-23T00:00:00
db:VULHUBid:VHN-13877date:2005-08-23T00:00:00
db:BIDid:14622date:2005-08-22T00:00:00
db:JVNDBid:JVNDB-2005-000834date:2008-11-21T00:00:00
db:PACKETSTORMid:39503date:2005-08-23T23:30:33
db:CNNVDid:CNNVD-200508-250date:2005-08-23T00:00:00
db:NVDid:CVE-2005-2668date:2005-08-23T04:00:00