ID

VAR-200707-0544


CVE

CVE-2007-0060


TITLE

plural CA Used in products Message Queuing Server Vulnerable to stack-based buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2007-001326

DESCRIPTION

Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104. Multiple Computer Associates products are prone to a remote stack-based buffer-overflow vulnerability. This issue affects the Message Queuing (CAM/CAFT) component. The application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer. A successful exploit will allow an attacker to execute arbitrary code with SYSTEM-level privileges. There is a buffer overflow vulnerability in the CAM service when processing malformed user requests. Remote attackers may use this vulnerability to control the server. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. Please see the vendor's advisory for more details. CAM (Windows): http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO89945 CAM(Netware): http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO89943 PROVIDED AND/OR DISCOVERED BY: IBM ISS X-Force ORIGINAL ADVISORY: CA: http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp IBM ISS X-Force: http://www.iss.net/threats/272.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Mitigating Factors: None Severity: CA has given this vulnerability a High risk rating. i.e. CAM versions 1.04, 1.05, 1.06, 1.07, 1.10 (prior to Build 54_4) and 1.11 (prior to Build 54_4). Affected Products: Advantage Data Transport 3.0 BrightStor SAN Manager 11.1, 11.5 BrightStor Portal 11.1 CleverPath OLAP 5.1 CleverPath ECM 3.5 CleverPath Predictive Analysis Server 2.0, 3.0 CleverPath Aion 10.0 eTrust Admin 2.01, 2.04, 2.07, 2.09, 8.0, 8.1 Unicenter Application Performance Monitor 3.0, 3.5 Unicenter Asset Management 3.1, 3.2, 3.2 SP1, 3.2 SP2, 4.0, 4.0 SP1 Unicenter Data Transport Option 2.0 Unicenter Enterprise Job Manager 1.0 SP1, 1.0 SP2 Unicenter Jasmine 3.0 Unicenter Management for WebSphere MQ 3.5 Unicenter Management for Microsoft Exchange 4.0, 4.1 Unicenter Management for Lotus Notes/Domino 4.0 Unicenter Management for Web Servers 5, 5.0.1 Unicenter NSM 3.0, 3.1 Unicenter NSM Wireless Network Management Option 3.0 Unicenter Remote Control 6.0, 6.0 SP1 Unicenter Service Level Management 3.0, 3.0.1, 3.0.2, 3.5 Unicenter Software Delivery 3.0, 3.1, 3.1 SP1, 3.1 SP2, 4.0, 4.0 SP1 Unicenter TNG 2.1, 2.2, 2.4, 2.4.2 Unicenter TNG JPN 2.2 Affected Platforms: Windows and NetWare Platforms NOT affected: AIX, AS/400, DG Intel, DG Motorola, DYNIX, HP-UX, IRIX, Linux Intel, Linux s/390, MVS, Open VMS, OS/2, OSF1, Solaris Intel, Solaris Sparc and UnixWare. Status and Recommendation: CA has made patches available for all affected products. These patches are independent of the CA Software that installed CAM. Simply select the patch appropriate to the platform, and the installed version of CAM, and follow the patch application instructions. You should also review the product home pages on SupportConnect for any additional product specific instructions. Solutions for CAM: Platform Solution Windows QO89945 NetWare QO89943 How to determine if you are affected: Determining CAM versions: Simply running camstat will return the version information in the top line of the output on any platform. The camstat command is located in the bin subfolder of the installation directory. The example below indicates that CAM version 1.11 build 27 increment 2 is running. E:\>camstat CAM – machine.ca.com Version 1.11 (Build 27_2) up 0 days 1:16 Determining the CAM install directory: Windows: The install location is specified by the %CAI_MSQ% environment variable. Unix/Linux/Mac: The /etc/catngcampath text file holds the CAM install location. Workaround: The affected listening port can be disabled by creating or updating CAM's configuration file, CAM.CFG, with the following entry under the "*CONFIG" section: *CONFIG cas_port=0 The CA Messaging Server must be recycled in order for this to take effect. We advise that products dependent upon CAM should be shutdown prior to recycling CAM. Once dependent products have been shutdown, CAM can be recycled with the following commands: On Windows: camclose cam start On NetWare: load camclose load cam start Once CAM has been restarted, any CAM dependent products that were shutdown can be restarted. For technical questions or comments related to this advisory, please send email to vuln AT ca DOT com. If you discover a vulnerability in CA products, please report your findings to vuln AT ca DOT com, or utilize our "Submit a Vulnerability" form. URL: http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx Regards, Ken Williams ; 0xE2941985 Director, CA Vulnerability Research CA, 1 CA Plaza, Islandia, NY 11749 Contact http://www.ca.com/us/contact/ Legal Notice http://www.ca.com/us/legal/ Privacy Policy http://www.ca.com/us/privacy/ Copyright (c) 2007 CA. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.5.3 (Build 5003) wj8DBQFGpqCHeSWR3+KUGYURAt6DAJ0YpnaiwrNfhhQlvdvL28LYxBYbZgCfRpKQ pNdOPBvd1/BVRF6Lo65uo2o= =7w0f -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2007-0060 // JVNDB: JVNDB-2007-001326 // BID: 25051 // VULHUB: VHN-23422 // PACKETSTORM: 58028 // PACKETSTORM: 58025

AFFECTED PRODUCTS

vendor:camodel:unicenter software deliveryscope:eqversion:4.0

Trust: 1.6

vendor:camodel:unicenter tngscope:eqversion:2.2

Trust: 1.6

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.4

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.1

Trust: 1.0

vendor:broadcommodel:unicenter asset managementscope:eqversion:4.0

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.2

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.4

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.5

Trust: 1.0

vendor:broadcommodel:etrust adminscope:eqversion:8.1

Trust: 1.0

vendor:broadcommodel:brightstor san managerscope:eqversion:11.5

Trust: 1.0

vendor:broadcommodel:cleverpath ecmscope:eqversion:3.5

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:5.0

Trust: 1.0

vendor:camodel:unicenter asset managementscope:eqversion:4.0

Trust: 1.0

vendor:broadcommodel:cleverpath predictive analysis serverscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:brightstor portalscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:unicenter data transport optionscope:eqversion:2.0

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.0.1

Trust: 1.0

vendor:broadcommodel:unicenter asset managementscope:eqversion:3.2

Trust: 1.0

vendor:broadcommodel:unicenter remote controlscope:eqversion:6.0

Trust: 1.0

vendor:broadcommodel:advantage data transportscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:etrust adminscope:eqversion:8.0

Trust: 1.0

vendor:broadcommodel:cleverpath aionscope:eqversion:10.0

Trust: 1.0

vendor:camodel:unicenter enterprise job managerscope:eqversion:1.0

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.4.2

Trust: 1.0

vendor:broadcommodel:unicenter software deliveryscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:cleverpath predictive analysis serverscope:eqversion:2.0

Trust: 1.0

vendor:broadcommodel:unicenter application performance monitorscope:eqversion:3.5

Trust: 1.0

vendor:broadcommodel:brightstor san managerscope:eqversion:11.1

Trust: 1.0

vendor:broadcommodel:unicenter jasminescope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter software deliveryscope:eqversion:3.1

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.7

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:5.0.1

Trust: 1.0

vendor:broadcommodel:unicenter service level managementscope:eqversion:3.0.2

Trust: 1.0

vendor:broadcommodel:cleverpath olapscope:eqversion:5.1

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:4.0

Trust: 1.0

vendor:broadcommodel:unicenter tngscope:eqversion:2.1

Trust: 1.0

vendor:broadcommodel:unicenter asset managementscope:eqversion:3.1

Trust: 1.0

vendor:broadcommodel:unicenter network and systems managementscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter nsm wireless network management optionscope:eqversion:3.0

Trust: 1.0

vendor:broadcommodel:unicenter software deliveryscope:eqversion:4.0

Trust: 1.0

vendor:camodel:unicenter managementscope:eqversion:4.1

Trust: 1.0

vendor:camodel:etrust adminscope:eqversion:2.9

Trust: 1.0

vendor:broadcommodel:unicenter application performance monitorscope:eqversion:3.0

Trust: 1.0

vendor:camodel:brightstor portalscope: - version: -

Trust: 0.8

vendor:camodel:brightstor san managerscope: - version: -

Trust: 0.8

vendor:camodel:advantage data transportscope: - version: -

Trust: 0.8

vendor:camodel:cleverpath aionscope: - version: -

Trust: 0.8

vendor:camodel:cleverpath ecmscope: - version: -

Trust: 0.8

vendor:camodel:cleverpath olapscope: - version: -

Trust: 0.8

vendor:camodel:cleverpath predictive analysis serverscope: - version: -

Trust: 0.8

vendor:camodel:etrust adminscope: - version: -

Trust: 0.8

vendor:camodel:unicenter application performance monitorscope: - version: -

Trust: 0.8

vendor:camodel:unicenter asset managementscope: - version: -

Trust: 0.8

vendor:camodel:unicenter data transport optionscope: - version: -

Trust: 0.8

vendor:camodel:unicenter enterprise job managerscope: - version: -

Trust: 0.8

vendor:camodel:unicenter jasminescope: - version: -

Trust: 0.8

vendor:camodel:unicenter managementscope: - version: -

Trust: 0.8

vendor:camodel:unicenter network and systems managementscope: - version: -

Trust: 0.8

vendor:camodel:unicenter nsm wireless network management optionscope: - version: -

Trust: 0.8

vendor:camodel:unicenter remote controlscope: - version: -

Trust: 0.8

vendor:camodel:unicenter service level managementscope: - version: -

Trust: 0.8

vendor:camodel:unicenter software deliveryscope: - version: -

Trust: 0.8

vendor:camodel:unicenter tngscope: - version: -

Trust: 0.8

vendor:camodel:unicenter tngscope:eqversion:2.4.2

Trust: 0.6

vendor:camodel:unicenter tngscope:eqversion:2.1

Trust: 0.6

vendor:camodel:unicenter tngscope:eqversion:2.4

Trust: 0.6

vendor:camodel:unicenter software deliveryscope:eqversion:3.1

Trust: 0.6

vendor:computermodel:associates unicenter tngscope:eqversion:2.4.2

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.4

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.2

Trust: 0.3

vendor:computermodel:associates unicenter tngscope:eqversion:2.1

Trust: 0.3

vendor:computermodel:associates unicenter software delivery sp1scope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter software delivery sp2scope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter software delivery sp1scope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter software deliveryscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.0.2

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.0.1

Trust: 0.3

vendor:computermodel:associates unicenter service level managementscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter remote control sp1scope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter remote controlscope:eqversion:6.0

Trust: 0.3

vendor:computermodel:associates unicenter nsm wireless network management optionscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter network and systems managementscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter management for websphere mqscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter management for web serversscope:eqversion:5.0.1

Trust: 0.3

vendor:computermodel:associates unicenter management for web serversscope:eqversion:5.0

Trust: 0.3

vendor:computermodel:associates unicenter management for microsoft exchangescope:eqversion:4.1

Trust: 0.3

vendor:computermodel:associates unicenter management for microsoft exchangescope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter management for lotus notes/dominoscope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter jasminescope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp2scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter enterprise job manager sp1scope:eqversion:1.0

Trust: 0.3

vendor:computermodel:associates unicenter data transport optionscope:eqversion:2.0

Trust: 0.3

vendor:computermodel:associates unicenter asset management sp1scope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:4.0

Trust: 0.3

vendor:computermodel:associates unicenter asset management sp2scope:eqversion:3.2

Trust: 0.3

vendor:computermodel:associates unicenter asset management sp1scope:eqversion:3.2

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:3.2

Trust: 0.3

vendor:computermodel:associates unicenter asset managementscope:eqversion:3.1

Trust: 0.3

vendor:computermodel:associates unicenter application performance monitorscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates unicenter application performance monitorscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.1

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:8.0

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.09

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.07

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.04

Trust: 0.3

vendor:computermodel:associates etrust adminscope:eqversion:2.01

Trust: 0.3

vendor:computermodel:associates cleverpath predictive analysis serverscope:eqversion:3.0

Trust: 0.3

vendor:computermodel:associates cleverpath predictive analysis serverscope:eqversion:2.0

Trust: 0.3

vendor:computermodel:associates cleverpath olapscope:eqversion:5.1

Trust: 0.3

vendor:computermodel:associates cleverpath ecmscope:eqversion:3.5

Trust: 0.3

vendor:computermodel:associates cleverpath aionscope:eqversion:10.0

Trust: 0.3

vendor:computermodel:associates brightstor san managerscope:eqversion:11.5

Trust: 0.3

vendor:computermodel:associates brightstor san managerscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates brightstor portalscope:eqversion:11.1

Trust: 0.3

vendor:computermodel:associates advantage data transportscope:eqversion:3.0

Trust: 0.3

sources: BID: 25051 // JVNDB: JVNDB-2007-001326 // CNNVD: CNNVD-200707-429 // NVD: CVE-2007-0060

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0060
value: HIGH

Trust: 1.0

NVD: CVE-2007-0060
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200707-429
value: CRITICAL

Trust: 0.6

VULHUB: VHN-23422
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0060
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-23422
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-23422 // JVNDB: JVNDB-2007-001326 // CNNVD: CNNVD-200707-429 // NVD: CVE-2007-0060

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0060

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 58025 // CNNVD: CNNVD-200707-429

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200707-429

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001326

PATCH

title:Security Notice for CA Message Queuing (CAM / CAFT) vulnerabilityurl:https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=149849

Trust: 0.8

title:CA Repair Measures for Security Vulnerabilities of Message Queuing Serverurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=146846

Trust: 0.6

sources: JVNDB: JVNDB-2007-001326 // CNNVD: CNNVD-200707-429

EXTERNAL IDS

db:NVDid:CVE-2007-0060

Trust: 2.9

db:BIDid:25051

Trust: 2.0

db:SECUNIAid:26190

Trust: 1.8

db:SECTRACKid:1018449

Trust: 1.7

db:VUPENid:ADV-2007-2638

Trust: 1.7

db:JVNDBid:JVNDB-2007-001326

Trust: 0.8

db:CNNVDid:CNNVD-200707-429

Trust: 0.7

db:PACKETSTORMid:58025

Trust: 0.2

db:VULHUBid:VHN-23422

Trust: 0.1

db:PACKETSTORMid:58028

Trust: 0.1

db:XFid:32234

Trust: 0.1

sources: VULHUB: VHN-23422 // BID: 25051 // JVNDB: JVNDB-2007-001326 // PACKETSTORM: 58028 // PACKETSTORM: 58025 // CNNVD: CNNVD-200707-429 // NVD: CVE-2007-0060

REFERENCES

url:http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809

Trust: 2.1

url:http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp

Trust: 1.8

url:http://www.iss.net/threats/272.html

Trust: 1.8

url:http://www.securityfocus.com/bid/25051

Trust: 1.7

url:http://www.securityfocus.com/archive/1/474602/100/0/threaded

Trust: 1.7

url:http://www.securitytracker.com/id?1018449

Trust: 1.7

url:http://secunia.com/advisories/26190

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/2638

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32234

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0060

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0060

Trust: 0.8

url:http://iss.net/threats/272.html

Trust: 0.4

url:http://www.ca.com

Trust: 0.3

url:/archive/1/474602

Trust: 0.3

url:http://secunia.com/product/5586/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/5581/

Trust: 0.1

url:http://secunia.com/product/5574/

Trust: 0.1

url:http://secunia.com/product/5585/

Trust: 0.1

url:http://secunia.com/product/5580/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/5595/

Trust: 0.1

url:http://secunia.com/product/5587/

Trust: 0.1

url:http://secunia.com/product/5594/

Trust: 0.1

url:http://secunia.com/product/5591/

Trust: 0.1

url:http://secunia.com/product/5583/

Trust: 0.1

url:http://secunia.com/product/5576/

Trust: 0.1

url:http://secunia.com/product/1682/

Trust: 0.1

url:http://secunia.com/product/5577/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/5590/

Trust: 0.1

url:http://secunia.com/product/5582/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo89943

Trust: 0.1

url:http://secunia.com/product/3206/

Trust: 0.1

url:http://secunia.com/product/5596/

Trust: 0.1

url:http://secunia.com/product/5588/

Trust: 0.1

url:http://secunia.com/product/5584/

Trust: 0.1

url:http://secunia.com/product/5578/

Trust: 0.1

url:http://secunia.com/product/5579/

Trust: 0.1

url:http://secunia.com/product/2622/

Trust: 0.1

url:http://secunia.com/product/1683/

Trust: 0.1

url:http://secunia.com/advisories/26190/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://supportconnect.ca.com/sc/redir.jsp?reqpage=search&searchid=qo89945

Trust: 0.1

url:http://secunia.com/product/5589/

Trust: 0.1

url:http://secunia.com/product/5592/

Trust: 0.1

url:http://secunia.com/product/5593/

Trust: 0.1

url:http://secunia.com/product/5597/

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0060

Trust: 0.1

url:http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35527

Trust: 0.1

url:http://supportconnect.ca.com.

Trust: 0.1

url:http://osvdb.org/

Trust: 0.1

url:http://supportconnect.ca.com/

Trust: 0.1

url:http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-s

Trust: 0.1

url:http://www.ca.com/us/contact/

Trust: 0.1

url:http://www.ca.com/us/legal/

Trust: 0.1

url:http://xforce.iss.net/xforce/xfdb/32234

Trust: 0.1

url:http://www.ca.com/us/privacy/

Trust: 0.1

sources: VULHUB: VHN-23422 // BID: 25051 // JVNDB: JVNDB-2007-001326 // PACKETSTORM: 58028 // PACKETSTORM: 58025 // CNNVD: CNNVD-200707-429 // NVD: CVE-2007-0060

CREDITS

Paul Mehta

Trust: 0.6

sources: CNNVD: CNNVD-200707-429

SOURCES

db:VULHUBid:VHN-23422
db:BIDid:25051
db:JVNDBid:JVNDB-2007-001326
db:PACKETSTORMid:58028
db:PACKETSTORMid:58025
db:CNNVDid:CNNVD-200707-429
db:NVDid:CVE-2007-0060

LAST UPDATE DATE

2024-11-23T22:50:15.392000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-23422date:2018-10-16T00:00:00
db:BIDid:25051date:2007-07-27T15:35:00
db:JVNDBid:JVNDB-2007-001326date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200707-429date:2021-04-08T00:00:00
db:NVDid:CVE-2007-0060date:2024-11-21T00:24:52.510

SOURCES RELEASE DATE

db:VULHUBid:VHN-23422date:2007-07-26T00:00:00
db:BIDid:25051date:2007-07-24T00:00:00
db:JVNDBid:JVNDB-2007-001326date:2012-06-26T00:00:00
db:PACKETSTORMid:58028date:2007-07-26T04:26:32
db:PACKETSTORMid:58025date:2007-07-25T04:52:10
db:CNNVDid:CNNVD-200707-429date:2007-07-25T00:00:00
db:NVDid:CVE-2007-0060date:2007-07-26T00:30:00