ID

VAR-200512-0273


CVE

CVE-2005-3653


TITLE

CA iTechnology iGateway Service negative Content-Length Field value buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200512-713

DESCRIPTION

Heap-based buffer overflow in the iGateway service for various Computer Associates (CA) iTechnology products, in iTechnology iGateway before 4.0.051230, allows remote attackers to execute arbitrary code via an HTTP request with a negative Content-Length field. The attacker can trigger the vulnerability by supplying a negative HTTP Content-Length value and a large URI to the service. A successful attack can result in corrupting process memory and the execution of arbitrary code with SYSTEM privileges on Windows platforms. The vendor has reported that this issue triggers only a denial-of-service condition on other platforms. Products containing iGateway 4.0.051230 are vulnerable to this issue. iTechnology is an integrated technology that provides standard Web service interfaces for third-party products. There is a heap overflow vulnerability in iTechnology's processing of HTTP request headers. iGateway service monitors standard HTTP or SSL communication on port 5250. The service does not properly handle negative HTTP Content-Length fields. iGateway parses the Content-length field value of the HTTP request and uses this value directly in the malloc() heap allocation call, so if a negative value is provided, the heap allocation call will return a small buffer. After the malloc() call, memcpy the provided URI to the allocated buffer and overwrite it to the heap. TITLE: CA Products iGateway Service Content-Length Buffer Overflow SECUNIA ADVISORY ID: SA18591 VERIFY ADVISORY: http://secunia.com/advisories/18591/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From local network SOFTWARE: BrightStor ARCserve Backup 11.x http://secunia.com/product/312/ BrightStor ARCserve Backup 11.x (for Windows) http://secunia.com/product/3099/ BrightStor ARCserve Backup 9.x http://secunia.com/product/313/ BrightStor ARCserve Backup for Laptops & Desktops 11.x http://secunia.com/product/5906/ BrightStor Enterprise Backup 10.x http://secunia.com/product/314/ BrightStor Process Automation Manager 11.x http://secunia.com/product/5908/ BrightStor Storage Resource Manager 11.x http://secunia.com/product/5909/ BrightStor Storage Resource Manager 6.x http://secunia.com/product/5910/ CA Advantage Data Transformer 2.x http://secunia.com/product/5904/ CA AllFusion Harvest Change Manager 7.x http://secunia.com/product/5905/ CA BrightStor Portal 11.x http://secunia.com/product/5577/ CA BrightStor SAN Manager 11.x http://secunia.com/product/5576/ CA eTrust Admin 8.x http://secunia.com/product/5584/ CA eTrust Audit 1.x http://secunia.com/product/5911/ CA eTrust Audit 8.x http://secunia.com/product/5912/ CA eTrust Identity Minder 8.x http://secunia.com/product/5913/ CA Unicenter Service Fulfillment 2.x http://secunia.com/product/5942/ eTrust Secure Content Manager (SCM) http://secunia.com/product/3391/ DESCRIPTION: Erika Mendoza has reported a vulnerability in various CA products, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in the handling of HTTP data in the iGateway component. SOLUTION: Update the iGateway component to version 4.0.051230 or later. ftp://ftp.ca.com/pub/iTech/downloads/ PROVIDED AND/OR DISCOVERED BY: Erika Mendoza ORIGINAL ADVISORY: Computer Associates: http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33778 iDEFENSE: http://www.idefense.com/intelligence/vulnerabilities/display.php?id=376 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Please see below for important changes to CAID 33778 (aka CVE-2005-3653; OSVDB 22688; X-Force 24269; SecurityTracker Alert ID 1015526). Changelog is near end of advisory. Regards, Ken Williams Title: CAID 33778 - CA iGateway Content-Length Buffer Overflow Vulnerability [v1.1] CA Vulnerability ID: 33778 CA Advisory Date: 2006-01-23 Updated Advisory [v1.1]: 2006-01-26 Discovered By: Erika Mendoza reported this issue to iDefense. Mitigating Factors: None. Severity: CA has given this vulnerability a Medium risk rating. Affected Technologies: Please note that the iGateway component is not a product, but rather a common component that is included with multiple products. The iGateway component is included in the following CA products, which are consequently potentially vulnerable. Affected Products: BrightStor ARCserve Backup r11.5 BrightStor ARCserve Backup r11.1 BrightStor ARCserve Backup for Windows r11 BrightStor Enterprise Backup 10.5 BrightStor ARCserve Backup v9.01 BrightStor ARCserve Backup Laptop & Desktop r11.1 BrightStor ARCserve Backup Laptop & Desktop r11 BrightStor Process Automation Manager r11.1 BrightStor SAN Manager r11.1 BrightStor SAN Manager r11.5 BrightStor Storage Resource Manager r11.5 BrightStor Storage Resource Manager r11.1 BrightStor Storage Resource Manager 6.4 BrightStor Storage Resource Manager 6.3 BrightStor Portal 11.1 Note to BrightStor Storage Resource Manager and BrightStor Portal users: In addition to the application servers where these products are installed, all hosts that have iSponsors deployed to them for managing applications like Veritas Volume Manager and Tivoli TSM are also affected by this vulnerability. eTrust Products: eTrust Audit 1.5 SP2 (iRecorders and ARIES) eTrust Audit 1.5 SP3 (iRecorders and ARIES) eTrust Audit 8.0 (iRecorders and ARIES) eTrust Admin 8.1 eTrust Identity Minder 8.0 eTrust Secure Content Manager (SCM) R8 eTrust Integrated Threat Management (ITM) R8 eTrust Directory, R8.1 (Web Components Only) Unicenter Products: Unicenter CA Web Services Distributed Management R11 Unicenter AutoSys JM R11 Unicenter Management for WebLogic / Management for WebSphere R11 Unicenter Service Delivery R11 Unicenter Service Level Management (USLM) R11 Unicenter Application Performance Monitor R11 Unicenter Service Desk R11 Unicenter Service Desk Knowledge Tools R11 Unicenter Asset Portfolio Management R11 Unicenter Service Metric Analysis R11 Unicenter Service Catalog/Assure/Accounting R11 Unicenter MQ Management R11 Unicenter Application Server Management R11 Unicenter Web Server Management R11 Unicenter Exchange Management R11 Affected platforms: AIX, HP-UX, Linux Intel, Solaris, and Windows Status and Recommendation: Customers with vulnerable versions of the iGateway component should upgrade to the current version of iGateway (4.0.051230 or later), which is available for download from the following locations: http://supportconnect.ca.com/ ftp://ftp.ca.com/pub/iTech/downloads/ Determining the version of iGateway: To determine the version numbers of the iGateway components: Go to the igateway directory: On windows, this is %IGW_LOC% Default path for v3.*: C:\Program Files\CA\igateway Default path for v4.*: C:\Program Files\CA\SharedComponents\iTechnology On unix, Default path for v3.*: /opt/CA/igateway Default path for v4.*: the install directory path is contained in opt/CA/SharedComponents/iTechnology.location. The default path is /opt/CA/SharedComponents/iTechnology Look at the <Version> element in igateway.conf. The versions are affected by this vulnerability if you see a value LESS THAN the following: <Version>4.0.051230</Version> (note the format of v.s.YYMMDD) References: (note that URLs may wrap) CA SupportConnect: http://supportconnect.ca.com/ http://supportconnectw.ca.com/public/ca_common_docs/igatewaysecurity_not ice.asp CAID: 33778 CAID Advisory link: http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33778 CVE Reference: CVE-2005-3653 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3653 OSVDB Reference: OSVDB-22688 http://osvdb.org/22688 iDefense Reference: Computer Associates iTechnology iGateway Service Content-Length Buffer Overflow http://www.idefense.com/intelligence/vulnerabilities/display.php?id=376 Changelog: v1.0 - Initial Release v1.1 - Removed several unaffected technologies; added more reference links. Customers who require additional information should contact CA Technical Support at http://supportconnect.ca.com. For technical questions or comments related to this advisory, please send email to vuln@ca.com, or contact me directly. If you discover a vulnerability in CA products, please report your findings to vuln@ca.com, or utilize our "Submit a Vulnerability" form. URL: http://www3.ca.com/securityadvisor/vulninfo/submit.aspx Regards, Ken Williams ; 0xE2941985 Dir. of CA Vulnerability Research Team CA, One Computer Associates Plaza. Islandia, NY 11749 Contact http://www3.ca.com/contact/ Legal Notice http://ca.com/calegal.htm Privacy Policy http://www.ca.com/caprivacy.htm Copyright 2006 CA. All rights reserved

Trust: 1.44

sources: NVD: CVE-2005-3653 // BID: 16354 // VULHUB: VHN-14861 // PACKETSTORM: 43303 // PACKETSTORM: 43468

AFFECTED PRODUCTS

vendor:camodel:unicenter application performance monitorscope:eqversion:11.0

Trust: 1.6

vendor:camodel:etrust secure content managerscope:eqversion:8.0

Trust: 1.6

vendor:camodel:brightstor arcserve backupscope:eqversion:11

Trust: 1.6

vendor:camodel:etrust directoryscope:eqversion:8.1_web_components

Trust: 1.6

vendor:camodel:unicenter application server managmentscope:eqversion:11.0

Trust: 1.6

vendor:broadcommodel:brightstor arcserve backupscope:eqversion:9.01

Trust: 1.0

vendor:broadcommodel:brightstor san managerscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:unicenter service deliveryscope:eqversion:11.0

Trust: 1.0

vendor:broadcommodel:etrust identity minderscope:eqversion:8.0

Trust: 1.0

vendor:broadcommodel:etrust integrated threat managementscope:eqversion:8.0

Trust: 1.0

vendor:broadcommodel:unicenter service deskscope:eqversion:11.0

Trust: 1.0

vendor:broadcommodel:unicenter autosys jmscope:eqversion:11.0

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:3.5

Trust: 1.0

vendor:broadcommodel:brightstor storage resource managerscope:eqversion:11.5

Trust: 1.0

vendor:camodel:brightstor enterprise backupscope:eqversion:10.0

Trust: 1.0

vendor:camodel:unicenter web services distributed managementscope:eqversion:11.0

Trust: 1.0

vendor:camodel:unicenter service catalog fulfillment accountingscope:eqversion:11.0

Trust: 1.0

vendor:camodel:brightstor enterprise backupscope:eqversion:10.5

Trust: 1.0

vendor:broadcommodel:brightstor arcserve backupscope:eqversion:11.5

Trust: 1.0

vendor:broadcommodel:unicenter service desk knowledge toolsscope:eqversion:11.0

Trust: 1.0

vendor:broadcommodel:etrust adminscope:eqversion:8.1

Trust: 1.0

vendor:camodel:unicenter web server managementscope:eqversion:11.0

Trust: 1.0

vendor:broadcommodel:brightstor storage resource managerscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:etrust audit irecorderscope:eqversion:1.5

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:11.0

Trust: 1.0

vendor:camodel:unicenter service fulfillmentscope:eqversion:11.0

Trust: 1.0

vendor:broadcommodel:unicenter asset portfolio managementscope:eqversion:11.0

Trust: 1.0

vendor:camodel:unicenter service level managementscope:eqversion:11.0

Trust: 1.0

vendor:broadcommodel:brightstor arcserve backupscope:eqversion:11.1

Trust: 1.0

vendor:camodel:unicenter ca web services distributed managementscope:eqversion:11.0

Trust: 1.0

vendor:broadcommodel:brightstor san managerscope:eqversion:11.5

Trust: 1.0

vendor:camodel:unicenter exchange management consolescope:eqversion:11.0

Trust: 1.0

vendor:broadcommodel:itechnology igatewayscope:lteversion:4.0.050615

Trust: 1.0

vendor:broadcommodel:brightstor arcserve backup laptops desktopsscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:etrust audit ariesscope:eqversion:8.0

Trust: 1.0

vendor:broadcommodel:unicenter service metric analysisscope:eqversion:11.0

Trust: 1.0

vendor:camodel:etrust audit ariesscope:eqversion:1.5

Trust: 1.0

vendor:broadcommodel:brightstor process automation managerscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:brightstor portalscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:brightstor storage resource managerscope:eqversion:6.3

Trust: 1.0

vendor:broadcommodel:brightstor storage resource managerscope:eqversion:6.4

Trust: 1.0

vendor:broadcommodel:etrust audit irecorderscope:eqversion:8.0

Trust: 1.0

vendor:broadcommodel:unicenter service fulfillmentscope:eqversion:2.2

Trust: 1.0

vendor:broadcommodel:brightstor arcserve backup laptops desktopsscope:eqversion:11.0

Trust: 1.0

vendor:camodel:brightstor arcserve backupscope:eqversion:9.01

Trust: 0.6

vendor:camodel:etrust integrated threat managementscope:eqversion:8.0

Trust: 0.6

vendor:camodel:unicenter asset portfolio managementscope:eqversion:11.0

Trust: 0.6

vendor:camodel:etrust identity minderscope:eqversion:8.0

Trust: 0.6

vendor:camodel:brightstor arcserve backup laptops desktopsscope:eqversion:11.0

Trust: 0.6

vendor:computermodel:associates unicenter web server managementscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter service matrix analysisscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter service fulfillmentscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter service fulfillmentscope:eqversion:2.2

Trust: 0.3

vendor:computermodel:associates unicenter service desk knowledge toolsscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter service deskscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter service deliveryscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter service catalog/fulfillment/accountingscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter mq managementscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter management for webspherescope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter management for weblogicscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter exchange managementscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter ca web services distributed managementscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter autosys jmscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter asset portfolio managementscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter application server managmentscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates unicenter application performance monitorscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates etrust secure content managerscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust integrated threat managementscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust identity minderscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust directoryscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust audit irecordersscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust audit irecorders sp3scope:eqversion:1.5

Trust: 0.3

vendor:computermodel:associates etrust audit irecorders sp2scope:eqversion:1.5

Trust: 0.3

vendor:computermodel:associates etrust audit ariesscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust audit aries sp3scope:eqversion:1.5

Trust: 0.3

vendor:computermodel:associates etrust audit aries sp2scope:eqversion:1.5

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates brightstor srmscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates brightstor srmscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor srmscope:eqversion:6.4

Trust: 0.3

vendor:computermodel:associates brightstor srmscope:eqversion:6.3

Trust: 0.3

vendor:computermodel:associates brightstor san managerscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates brightstor san managerscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor process automation managerscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor portalscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor enterprise backup for windows bitscope:eqversion:6410.5

Trust: 0.3

vendor:computermodel:associates brightstor enterprise backup for tru64scope:eqversion:10.5

Trust: 0.3

vendor:computermodel:associates brightstor enterprise backup for solarisscope:eqversion:10.5

Trust: 0.3

vendor:computermodel:associates brightstor enterprise backup for solarisscope:eqversion:10.0

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backup for windowsscope:eqversion:11.0

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor arcserve backupscope:eqversion:9.01

Trust: 0.3

vendor:computermodel:associates arcserve backup for laptops and desktopsscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates arcserve backup for laptops and desktopsscope:eqversion:11.0

Trust: 0.3

sources: BID: 16354 // CNNVD: CNNVD-200512-713 // NVD: CVE-2005-3653

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-3653
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200512-713
value: CRITICAL

Trust: 0.6

VULHUB: VHN-14861
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-3653
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-14861
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14861 // CNNVD: CNNVD-200512-713 // NVD: CVE-2005-3653

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-14861 // NVD: CVE-2005-3653

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200512-713

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-200512-713

PATCH

title:CA iTechnology iGateway Service negative Content-Length Repair measures for field value buffer error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=146825

Trust: 0.6

sources: CNNVD: CNNVD-200512-713

EXTERNAL IDS

db:NVDid:CVE-2005-3653

Trust: 2.1

db:BIDid:16354

Trust: 2.0

db:OSVDBid:22688

Trust: 1.8

db:SECUNIAid:18591

Trust: 1.8

db:SECTRACKid:1015526

Trust: 1.7

db:SREASONid:380

Trust: 1.7

db:VUPENid:ADV-2006-0311

Trust: 1.7

db:CNNVDid:CNNVD-200512-713

Trust: 0.7

db:VULHUBid:VHN-14861

Trust: 0.1

db:PACKETSTORMid:43303

Trust: 0.1

db:PACKETSTORMid:43468

Trust: 0.1

sources: VULHUB: VHN-14861 // BID: 16354 // PACKETSTORM: 43303 // PACKETSTORM: 43468 // CNNVD: CNNVD-200512-713 // NVD: CVE-2005-3653

REFERENCES

url:http://www.idefense.com/intelligence/vulnerabilities/display.php?id=376

Trust: 2.2

url:http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33778

Trust: 1.9

url:http://www.securityfocus.com/bid/16354

Trust: 1.7

url:http://www.securityfocus.com/archive/1/423403/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/423288/100/0/threaded

Trust: 1.7

url:http://supportconnectw.ca.com/public/ca_common_docs/igatewaysecurity_notice.asp

Trust: 1.7

url:http://www.osvdb.org/22688

Trust: 1.7

url:http://securitytracker.com/id?1015526

Trust: 1.7

url:http://secunia.com/advisories/18591

Trust: 1.7

url:http://securityreason.com/securityalert/380

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/0311

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/24269

Trust: 1.7

url:http://marc.info/?l=full-disclosure&m=113803349715927&w=2

Trust: 1.6

url:http://www.ca.com/

Trust: 0.3

url:/archive/1/423403

Trust: 0.3

url:/archive/1/423288

Trust: 0.3

url:http://marc.info/?l=full-disclosure&amp;m=113803349715927&amp;w=2

Trust: 0.1

url:http://secunia.com/product/314/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/5912/

Trust: 0.1

url:http://secunia.com/product/3099/

Trust: 0.1

url:http://secunia.com/product/3391/

Trust: 0.1

url:http://secunia.com/product/5913/

Trust: 0.1

url:http://secunia.com/product/5576/

Trust: 0.1

url:http://secunia.com/product/5577/

Trust: 0.1

url:http://secunia.com/product/5911/

Trust: 0.1

url:http://secunia.com/product/5906/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/5904/

Trust: 0.1

url:http://secunia.com/product/5905/

Trust: 0.1

url:http://secunia.com/advisories/18591/

Trust: 0.1

url:http://secunia.com/product/5908/

Trust: 0.1

url:http://secunia.com/product/5584/

Trust: 0.1

url:http://secunia.com/product/5909/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5942/

Trust: 0.1

url:http://secunia.com/product/5910/

Trust: 0.1

url:http://secunia.com/product/313/

Trust: 0.1

url:http://secunia.com/product/312/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-3653

Trust: 0.1

url:http://supportconnect.ca.com.

Trust: 0.1

url:http://ca.com/calegal.htm

Trust: 0.1

url:http://www.ca.com/caprivacy.htm

Trust: 0.1

url:http://supportconnectw.ca.com/public/ca_common_docs/igatewaysecurity_not

Trust: 0.1

url:http://osvdb.org/22688

Trust: 0.1

url:http://supportconnect.ca.com/

Trust: 0.1

url:http://www3.ca.com/contact/

Trust: 0.1

url:http://www3.ca.com/securityadvisor/vulninfo/submit.aspx

Trust: 0.1

sources: VULHUB: VHN-14861 // BID: 16354 // PACKETSTORM: 43303 // PACKETSTORM: 43468 // CNNVD: CNNVD-200512-713 // NVD: CVE-2005-3653

CREDITS

Erika Mendoza

Trust: 0.6

sources: CNNVD: CNNVD-200512-713

SOURCES

db:VULHUBid:VHN-14861
db:BIDid:16354
db:PACKETSTORMid:43303
db:PACKETSTORMid:43468
db:CNNVDid:CNNVD-200512-713
db:NVDid:CVE-2005-3653

LAST UPDATE DATE

2024-08-14T14:00:31.239000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14861date:2018-10-19T00:00:00
db:BIDid:16354date:2007-06-27T19:38:00
db:CNNVDid:CNNVD-200512-713date:2021-04-08T00:00:00
db:NVDid:CVE-2005-3653date:2021-04-14T15:41:53.463

SOURCES RELEASE DATE

db:VULHUBid:VHN-14861date:2005-12-31T00:00:00
db:BIDid:16354date:2006-01-23T00:00:00
db:PACKETSTORMid:43303date:2006-01-25T06:44:12
db:PACKETSTORMid:43468date:2006-01-29T22:15:05
db:CNNVDid:CNNVD-200512-713date:2005-12-31T00:00:00
db:NVDid:CVE-2005-3653date:2005-12-31T05:00:00