CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2007-0060

Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104.
Publish Date : 2007-07-25 Last Update Date : 2008-09-05
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
9.3
Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)
Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)
Access Complexity Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access Admin
Vulnerability Type(s) Execute CodeOverflow
CWE ID CWE id is not defined for this vulnerability

- Products Affected By CVE-2007-0060

# Product Type Vendor Product Version Update Edition Language
1 Application CA Advantage Data Transport 3.0 Version Details Vulnerabilities
2 Application CA Brightstor Portal 11.1 Version Details Vulnerabilities
3 Application CA Brightstor San Manager 11.1 Version Details Vulnerabilities
4 Application CA Brightstor San Manager 11.5 Version Details Vulnerabilities
5 Application CA Cleverpath Aion 10.0 Version Details Vulnerabilities
6 Application CA Cleverpath Ecm 3.5 Version Details Vulnerabilities
7 Application CA Cleverpath Olap 5.1 Version Details Vulnerabilities
8 Application CA Cleverpath Predictive Analysis Server 2.0 Version Details Vulnerabilities
9 Application CA Cleverpath Predictive Analysis Server 3.0 Version Details Vulnerabilities
10 Application CA Etrust Admin 2.1 Version Details Vulnerabilities
11 Application CA Etrust Admin 2.4 Version Details Vulnerabilities
12 Application CA Etrust Admin 2.7 Version Details Vulnerabilities
13 Application CA Etrust Admin 2.9 Version Details Vulnerabilities
14 Application CA Etrust Admin 8.0 Version Details Vulnerabilities
15 Application CA Etrust Admin 8.1 Version Details Vulnerabilities
16 Application CA Unicenter Application Performance Monitor 3.0 Version Details Vulnerabilities
17 Application CA Unicenter Application Performance Monitor 3.5 Version Details Vulnerabilities
18 Application CA Unicenter Asset Management 3.1 Version Details Vulnerabilities
19 Application CA Unicenter Asset Management 3.2 SP1 Version Details Vulnerabilities
20 Application CA Unicenter Asset Management 3.2 SP2 Version Details Vulnerabilities
21 Application CA Unicenter Asset Management 3.2 Version Details Vulnerabilities
22 Application CA Unicenter Asset Management 4.0 Version Details Vulnerabilities
23 Application CA Unicenter Asset Management 4.0 SP1 Version Details Vulnerabilities
24 Application CA Unicenter Data Transport Option 2.0 Version Details Vulnerabilities
25 Application CA Unicenter Enterprise Job Manager 1.0 SP1 Version Details Vulnerabilities
26 Application CA Unicenter Enterprise Job Manager 1.0 SP2 Version Details Vulnerabilities
27 Application CA Unicenter Jasmine 3.0 Version Details Vulnerabilities
28 Application CA Unicenter Management 4.0 Lotus Notes Domino Version Details Vulnerabilities
29 Application CA Unicenter Management 4.0 Microsoft Exchange Version Details Vulnerabilities
30 Application CA Unicenter Management 4.1 Microsoft Exchange Version Details Vulnerabilities
31 Application CA Unicenter Management 5.0 Web Servers Version Details Vulnerabilities
32 Application CA Unicenter Management 5.0.1 Web Servers Version Details Vulnerabilities
33 Application CA Unicenter Network And Systems Management 3.0 Version Details Vulnerabilities
34 Application CA Unicenter Network And Systems Management 3.1 Version Details Vulnerabilities
35 Application CA Unicenter Nsm Wireless Network Management Option 3.0 Version Details Vulnerabilities
36 Application CA Unicenter Remote Control 6.0 Version Details Vulnerabilities
37 Application CA Unicenter Remote Control 6.0 SP1 Version Details Vulnerabilities
38 Application CA Unicenter Service Level Management 3.0 Version Details Vulnerabilities
39 Application CA Unicenter Service Level Management 3.0.1 Version Details Vulnerabilities
40 Application CA Unicenter Service Level Management 3.0.2 Version Details Vulnerabilities
41 Application CA Unicenter Service Level Management 3.5 Version Details Vulnerabilities
42 Application CA Unicenter Software Delivery 3.0 Version Details Vulnerabilities
43 Application CA Unicenter Software Delivery 3.1 Version Details Vulnerabilities
44 Application CA Unicenter Software Delivery 3.1 SP1 Version Details Vulnerabilities
45 Application CA Unicenter Software Delivery 3.1 SP2 Version Details Vulnerabilities
46 Application CA Unicenter Software Delivery 4.0 Version Details Vulnerabilities
47 Application CA Unicenter Software Delivery 4.0 SP1 Version Details Vulnerabilities
48 Application CA Unicenter Tng 2.1 Version Details Vulnerabilities
49 Application CA Unicenter Tng 2.2 Version Details Vulnerabilities
50 Application CA Unicenter Tng 2.2 JP Version Details Vulnerabilities
51 Application CA Unicenter Tng 2.4 Version Details Vulnerabilities
52 Application CA Unicenter Tng 2.4.2 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
CA Advantage Data Transport 1
CA Brightstor Portal 1
CA Brightstor San Manager 2
CA Cleverpath Aion 1
CA Cleverpath Ecm 1
CA Cleverpath Olap 1
CA Cleverpath Predictive Analysis Server 2
CA Etrust Admin 6
CA Unicenter Application Performance Monitor 2
CA Unicenter Asset Management 6
CA Unicenter Data Transport Option 1
CA Unicenter Enterprise Job Manager 2
CA Unicenter Jasmine 1
CA Unicenter Management 5
CA Unicenter Network And Systems Management 2
CA Unicenter Nsm Wireless Network Management Option 1
CA Unicenter Remote Control 2
CA Unicenter Service Level Management 4
CA Unicenter Software Delivery 6
CA Unicenter Tng 5

- References For CVE-2007-0060

http://www.securityfocus.com/archive/1/archive/1/474602/100/0/threaded
BUGTRAQ 20070725 [CAID 35527]: CA Message Queuing (CAM / CAFT) Buffer Overflow Vulnerability
http://www.securitytracker.com/id?1018449
SECTRACK 1018449
http://secunia.com/advisories/26190
SECUNIA 26190
http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp CONFIRM
http://www.iss.net/threats/272.html
ISS 20070724 CA Message Queuing Server (Cam.exe) Overflow
http://www.frsirt.com/english/advisories/2007/2638
VUPEN ADV-2007-2638
http://xforce.iss.net/xforce/xfdb/32234
XF systems-management-bo(32234)
http://www.securityfocus.com/bid/25051
BID 25051 Computer Associates Multiple Products Message Queuing Remote Stack Buffer Overflow Vulnerability Release Date:2007-07-27
http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809 CONFIRM

- Metasploit Modules Related To CVE-2007-0060

There are not any metasploit modules related to this vulnerability (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.