ID

VAR-200508-0052


CVE

CVE-2005-2669


TITLE

Computer Associates Message Queuing software vulnerable to buffer overflows

Trust: 0.8

sources: CERT/CC: VU#619988

DESCRIPTION

Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets. CAM is prone to a vulnerability that could permit the spoofing of a CAFT application utilizing the CAM instance. This may ultimately allow the execution of arbitrary commands. CAFT is a file transfer application that utilizes CAM to send and receive the files. The problem presents itself due to a failure in the CAM service to verify the legitimacy of the CAFT application. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: CA Various Products Message Queuing Vulnerabilities SECUNIA ADVISORY ID: SA16513 VERIFY ADVISORY: http://secunia.com/advisories/16513/ CRITICAL: Moderately critical IMPACT: Spoofing, DoS, System access WHERE: >From local network SOFTWARE: CA Unicenter TNG 2.x http://secunia.com/product/3206/ CA Unicenter Software Delivery 4.x http://secunia.com/product/5597/ CA Unicenter Software Delivery 3.x http://secunia.com/product/5596/ CA Unicenter Service Level Management 3.x http://secunia.com/product/5595/ CA Unicenter Remote Control 6.x http://secunia.com/product/2622/ CA Unicenter Performance Management for OpenVMS 2.x http://secunia.com/product/5573/ CA Unicenter Network and Systems Management (NSM) Wireless Network Management Option 3.x http://secunia.com/product/5594/ CA Unicenter Network and Systems Management (NSM) 3.x http://secunia.com/product/1683/ CA Unicenter Management for WebSphere MQ 3.x http://secunia.com/product/5590/ CA Unicenter Management for Web Servers 5.x http://secunia.com/product/5593/ CA Unicenter Management for Microsoft Exchange 4.x http://secunia.com/product/5591/ CA Unicenter Management for Lotus Notes/Domino 4.x http://secunia.com/product/5592/ CA Unicenter Jasmine 3.x http://secunia.com/product/5589/ CA Unicenter Enterprise Job Manager 1.x http://secunia.com/product/5588/ CA Unicenter Data Transport Option 2.x http://secunia.com/product/5587/ CA Unicenter Asset Management 4.x http://secunia.com/product/1682/ CA Unicenter Asset Management 3.x http://secunia.com/product/5586/ CA Unicenter Application Performance Monitor 3.x http://secunia.com/product/5585/ CA eTrust Admin 8.x http://secunia.com/product/5584/ CA eTrust Admin 2.x http://secunia.com/product/5583/ CA CleverPath Predictive Analysis Server 3.x http://secunia.com/product/5581/ CA CleverPath Predictive Analysis Server 2.x http://secunia.com/product/5580/ CA CleverPath OLAP 5.x http://secunia.com/product/5578/ CA CleverPath Enterprise Content Manager (ECM) 3.x http://secunia.com/product/5579/ CA CleverPath Aion 10.x http://secunia.com/product/5582/ CA BrightStor SAN Manager 11.x http://secunia.com/product/5576/ CA BrightStor SAN Manager 1.x http://secunia.com/product/5575/ CA BrightStor Portal 11.x http://secunia.com/product/5577/ CA Advantage Data Transport 3.x http://secunia.com/product/5574/ DESCRIPTION: Some vulnerabilities have been reported in various products within the CA Message Queuing (CAM / CAFT) software, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. 1) An unspecified error in the CAM service can be exploited to cause a DoS by sending specially crafted packets to the TCP port. 2) Unspecified boundary errors can be exploited to cause buffer overflows by sending specially crafted packets to the service. SOLUTION: Apply patches (see vendor advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: Computer Associates: http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2005-2669 // CERT/CC: VU#619988 // BID: 14623 // VULHUB: VHN-13878 // PACKETSTORM: 39503

AFFECTED PRODUCTS

vendor:camodel:unicenter software deliveryscope:eqversion:4.0

Trust: 1.6

vendor:camodel:unicenter tngscope:eqversion:2.2

Trust: 1.6

vendor:broadcommodel:brightstor san managerscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:messagingscope:eqversion:1.7

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.9

Trust: 1.0

vendor:broadcommodel:brightstor san managerscope:eqversion:1.1

Trust: 1.0

vendor:broadcommodel:unicenter asset managementscope:eqversion:4.0

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.1

Trust: 1.0

vendor:broadcommodel:unicenter remote controlscope:eqversion:6.0

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.4

Trust: 1.0

vendor:broadcommodel:messagingscope:eqversion:1.5

Trust: 1.0

vendor:camodel:unicenter asset managementscope:eqversion:4.0

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:3.5

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:4.0

Trust: 1.0

vendor:broadcommodel:unicenter nsm wireless network management optionscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter data transport optionscope:eqversion:2.0

Trust: 1.0

vendor:broadcommodel:cleverpath olapscope:eqversion:5.1

Trust: 1.0

vendor:broadcommodel:adviseitscope:eqversion:2.4

Trust: 1.0

vendor:broadcommodel:unicenter software deliveryscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:cleverpath predictive analysis serverscope:eqversion:2.0

Trust: 1.0

vendor:broadcommodel:etrust adminscope:eqversion:8.1

Trust: 1.0

vendor:camodel:unicenter enterprise job managerscope:eqversion:1.0

Trust: 1.0

vendor:broadcommodel:unicenter management portalscope:eqversion:2.0

Trust: 1.0

vendor:broadcommodel:unicenter software deliveryscope:eqversion:4.0

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.2

Trust: 1.0

vendor:broadcommodel:etrust adminscope:eqversion:8.0

Trust: 1.0

vendor:broadcommodel:unicenter management portalscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:cleverpath aionscope:eqversion:10.0

Trust: 1.0

vendor:broadcommodel:unicenter asset managementscope:eqversion:3.2

Trust: 1.0

vendor:broadcommodel:unicenter jasminescope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.1

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.4

Trust: 1.0

vendor:broadcommodel:unicenter asset managementscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:advantage data transportscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.0.2

Trust: 1.0

vendor:broadcommodel:unicenter application performance monitorscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.4.2

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:4.1

Trust: 1.0

vendor:broadcommodel:unicenter performance managementscope:eqversion:2.4

Trust: 1.0

vendor:broadcommodel:cleverpath ecmscope:eqversion:3.5

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.0.1

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter application performance monitorscope:eqversion:3.5

Trust: 1.0

vendor:broadcommodel:cleverpath predictive analysis serverscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:3.0

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.7

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:5.0.1

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.5

Trust: 1.0

vendor:broadcommodel:brightstor portalscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:unicenter software deliveryscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:messagingscope:eqversion:1.11

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:5.0

Trust: 1.0

vendor:computer associatesmodel: - scope: - version: -

Trust: 0.8

vendor:camodel:unicenter tngscope:eqversion:2.4.2

Trust: 0.6

vendor:camodel:unicenter tngscope:eqversion:2.1

Trust: 0.6

vendor:camodel:unicenter tngscope:eqversion:2.4

Trust: 0.6

vendor:camodel:unicenter software deliveryscope:eqversion:3.1

Trust: 0.6

vendor:computermodel:associates unicenter tngscope:eqversion:2.4.2

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.4

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.2

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.1

Trust: 0.3

vendor:computermodel:associates unicenter software delivery sp1scope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter software delivery sp2scope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter software delivery sp1scope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.0.2

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.0.1

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter remote control sp1scope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter remote controlscope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter performance management for openvms sp3scope:eqversion:2.4

Trust: 0.3

vendor:computermodel:associates unicenter nsm wireless network management optionscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter management portalscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter management portalscope:eqversion:2.0

Trust: 0.3

vendor:computermodel:associates unicenter management for websphere mqscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter management for web serversscope:eqversion:5.0.1

Trust: 0.3

vendor:computermodel:associates unicenter management for web serversscope:eqversion:5.0

Trust: 0.3

vendor:computermodel:associates unicenter management for microsoft exchangescope:eqversion:4.1

Trust: 0.3

vendor:computermodel:associates unicenter management for microsoft exchangescope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter management for lotus notes/dominoscope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter jasminescope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp2scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp1scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter data transport optionscope:eqversion:2.0

Trust: 0.3

vendor:computermodel:associates unicenter asset management sp1scope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter asset management sp2scope:eqversion:3.2

Trust: 0.3

vendor:computermodel:associates unicenter asset management sp1scope:eqversion:3.2

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:3.2

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter application performance monitorscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter application performance monitorscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.9

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.7

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.4

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.1

Trust: 0.3

vendor:computermodel:associates cleverpath predictive analysis serverscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates cleverpath predictive analysis serverscope:eqversion:2.0

Trust: 0.3

vendor:computermodel:associates cleverpath olapscope:eqversion:5.1

Trust: 0.3

vendor:computermodel:associates cleverpath ecmscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates cleverpath aionscope:eqversion:10.0

Trust: 0.3

vendor:computermodel:associates camscope:eqversion:1.11

Trust: 0.3

vendor:computermodel:associates camscope:eqversion:1.07

Trust: 0.3

vendor:computermodel:associates camscope:eqversion:1.05

Trust: 0.3

vendor:computermodel:associates brightstor san managerscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor san manager sp2scope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates brightstor san manager sp1scope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates brightstor san managerscope:eqversion:1.1

Trust: 0.3

vendor:computermodel:associates brightstor portalscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates adviseitscope:eqversion:2.4

Trust: 0.3

vendor:computermodel:associates advantage data transportscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates cam build 29 13scope:neversion:1.11

Trust: 0.3

vendor:computermodel:associates cam build 220 13scope:neversion:1.07

Trust: 0.3

sources: CERT/CC: VU#619988 // BID: 14623 // CNNVD: CNNVD-200508-223 // NVD: CVE-2005-2669

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2669
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#619988
value: 13.13

Trust: 0.8

CNNVD: CNNVD-200508-223
value: CRITICAL

Trust: 0.6

VULHUB: VHN-13878
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-2669
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-13878
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#619988 // VULHUB: VHN-13878 // CNNVD: CNNVD-200508-223 // NVD: CVE-2005-2669

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-2669

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200508-223

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200508-223

PATCH

title:Computer Associates Message Queuing Security hole Repair measuresurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=146856

Trust: 0.6

sources: CNNVD: CNNVD-200508-223

EXTERNAL IDS

db:BIDid:14623

Trust: 2.8

db:SECUNIAid:16513

Trust: 2.6

db:NVDid:CVE-2005-2669

Trust: 2.0

db:OSVDBid:18917

Trust: 1.7

db:VUPENid:ADV-2005-1482

Trust: 1.7

db:SECTRACKid:1014756

Trust: 0.8

db:SECTRACKid:1014760

Trust: 0.8

db:SECTRACKid:1014761

Trust: 0.8

db:SECTRACKid:1014763

Trust: 0.8

db:SECTRACKid:1014764

Trust: 0.8

db:SECTRACKid:1014765

Trust: 0.8

db:SECTRACKid:1014766

Trust: 0.8

db:SECTRACKid:1014767

Trust: 0.8

db:SECTRACKid:1014768

Trust: 0.8

db:SECTRACKid:1014769

Trust: 0.8

db:SECTRACKid:1014770

Trust: 0.8

db:SECTRACKid:1014771

Trust: 0.8

db:SECTRACKid:1014772

Trust: 0.8

db:SECTRACKid:1014773

Trust: 0.8

db:SECTRACKid:1014774

Trust: 0.8

db:SECTRACKid:1014775

Trust: 0.8

db:OSVDBid:18916

Trust: 0.8

db:BIDid:14622

Trust: 0.8

db:CERT/CCid:VU#619988

Trust: 0.8

db:CNNVDid:CNNVD-200508-223

Trust: 0.7

db:VULHUBid:VHN-13878

Trust: 0.1

db:PACKETSTORMid:39503

Trust: 0.1

sources: CERT/CC: VU#619988 // VULHUB: VHN-13878 // BID: 14623 // PACKETSTORM: 39503 // CNNVD: CNNVD-200508-223 // NVD: CVE-2005-2669

REFERENCES

url:http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp

Trust: 2.9

url:http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32919

Trust: 2.5

url:http://www.securityfocus.com/bid/14623

Trust: 2.5

url:http://www.osvdb.org/18917

Trust: 1.7

url:http://secunia.com/advisories/16513

Trust: 1.7

url:http://www.vupen.com/english/advisories/2005/1482

Trust: 1.7

url:http://secunia.com/advisories/16513/

Trust: 0.9

url:http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_faqs.asp

Trust: 0.8

url:http://www.securityfocus.com/bid/14622

Trust: 0.8

url:http://osvdb.org/displayvuln.php?osvdb_id=18916

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014775.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014774.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014773.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014772.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014771.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014770.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014769.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014768.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014767.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014766.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014765.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014764.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014763.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014761.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014760.html

Trust: 0.8

url:http://securitytracker.com/alerts/2005/aug/1014756.html

Trust: 0.8

url:http://www.ca.com/

Trust: 0.3

url:/archive/1/408817

Trust: 0.3

url:http://secunia.com/product/5586/

Trust: 0.1

url:http://secunia.com/product/5575/

Trust: 0.1

url:http://secunia.com/product/5581/

Trust: 0.1

url:http://secunia.com/product/5574/

Trust: 0.1

url:http://secunia.com/product/5585/

Trust: 0.1

url:http://secunia.com/product/5580/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/5595/

Trust: 0.1

url:http://secunia.com/product/5587/

Trust: 0.1

url:http://secunia.com/product/5594/

Trust: 0.1

url:http://secunia.com/product/5591/

Trust: 0.1

url:http://secunia.com/product/5583/

Trust: 0.1

url:http://secunia.com/product/5576/

Trust: 0.1

url:http://secunia.com/product/1682/

Trust: 0.1

url:http://secunia.com/product/5577/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/5590/

Trust: 0.1

url:http://secunia.com/product/5582/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/product/3206/

Trust: 0.1

url:http://secunia.com/product/5596/

Trust: 0.1

url:http://secunia.com/product/2622/

Trust: 0.1

url:http://secunia.com/product/5588/

Trust: 0.1

url:http://secunia.com/product/5584/

Trust: 0.1

url:http://secunia.com/product/5578/

Trust: 0.1

url:http://secunia.com/product/5573/

Trust: 0.1

url:http://secunia.com/product/5579/

Trust: 0.1

url:http://secunia.com/product/1683/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5589/

Trust: 0.1

url:http://secunia.com/product/5593/

Trust: 0.1

url:http://secunia.com/product/5592/

Trust: 0.1

url:http://secunia.com/product/5597/

Trust: 0.1

sources: CERT/CC: VU#619988 // VULHUB: VHN-13878 // BID: 14623 // PACKETSTORM: 39503 // CNNVD: CNNVD-200508-223 // NVD: CVE-2005-2669

CREDITS

The discoverer of this issue is currently unknown. The vendor disclosed this issue.

Trust: 0.9

sources: BID: 14623 // CNNVD: CNNVD-200508-223

SOURCES

db:CERT/CCid:VU#619988
db:VULHUBid:VHN-13878
db:BIDid:14623
db:PACKETSTORMid:39503
db:CNNVDid:CNNVD-200508-223
db:NVDid:CVE-2005-2669

LAST UPDATE DATE

2024-08-14T13:40:04.664000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#619988date:2005-10-21T00:00:00
db:VULHUBid:VHN-13878date:2017-11-21T00:00:00
db:BIDid:14623date:2009-07-12T17:06:00
db:CNNVDid:CNNVD-200508-223date:2021-04-08T00:00:00
db:NVDid:CVE-2005-2669date:2021-04-14T15:46:28.003

SOURCES RELEASE DATE

db:CERT/CCid:VU#619988date:2005-08-23T00:00:00
db:VULHUBid:VHN-13878date:2005-08-23T00:00:00
db:BIDid:14623date:2005-08-22T00:00:00
db:PACKETSTORMid:39503date:2005-08-23T23:30:33
db:CNNVDid:CNNVD-200508-223date:2005-08-23T00:00:00
db:NVDid:CVE-2005-2669date:2005-08-23T04:00:00