CWE
NVD-CWE-Other 119
Advisory Published
Updated

CVE-2005-2668: Buffer Overflow

First published: Tue Aug 23 2005(Updated: )

Multiple buffer overflows in Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allow remote attackers to execute arbitrary code via unknown vectors.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Broadcom Unicenter Management Portal=4.1
Broadcom Unicenter Asset Management=4.0-sp1
Broadcom Unicenter Management Portal=3.5
Broadcom eTrust Admin=2.1
Broadcom Unicenter Software Delivery=4.0-sp1
Broadcom Unicenter Management Portal=5.0.1
CA Unicenter Enterprise Job Manager=1.0-sp1
Broadcom eTrust Admin=2.9
Broadcom eTrust Admin=2.4
Broadcom Unicenter Management Portal=4.0
Broadcom eTrust Admin=2.7
CA Unicenter Enterprise Job Manager=1.0-sp2
Broadcom Unicenter Management Portal=4.0
Broadcom Unicenter Management Portal=5.0
Broadcom Unicenter TNG=2.2
Broadcom Advantage Data Transport=3.0
Broadcom AdviseIT=2.4
Broadcom BrightStor Portal=11.1
Broadcom BrightStor SAN Manager=1.1
Broadcom BrightStor SAN Manager=1.1-sp1
Broadcom BrightStor SAN Manager=1.1-sp2
Broadcom BrightStor SAN Manager=11.1
Broadcom CleverPath AION=10.0
Broadcom CleverPath ECM=3.5
Broadcom CleverPath OLAP=5.1
Broadcom CleverPath Predictive Analysis Server=2.0
Broadcom CleverPath Predictive Analysis Server=3.0
Broadcom eTrust Admin=8.0
Broadcom eTrust Admin=8.1
Broadcom Message Queuing=1.5
Broadcom Message Queuing=1.7
Broadcom Message Queuing=1.11
Broadcom Unicenter Application Performance Monitor=3.0
Broadcom Unicenter Application Performance Monitor=3.5
Broadcom Unicenter Asset Management=3.1
Broadcom Unicenter Asset Management=3.2
Broadcom Unicenter Asset Management=3.2-sp1
Broadcom Unicenter Asset Management=3.2-sp2
Broadcom Unicenter Asset Management=4.0
Broadcom Unicenter Data Transport Option=2.0
CA Unicenter Remote Control=6.0
CA Unicenter Remote Control=6.0-sp1
Broadcom CA Service Level Management=3.0
Broadcom CA Service Level Management=3.0.1
Broadcom CA Service Level Management=3.0.2
Broadcom CA Service Level Management=3.5
Broadcom Unicenter Jasmine=3.0
CA Unicenter Management Portal=2.0
CA Unicenter Management Portal=3.1
CA Network and Systems Management=3.0
CA Network and Systems Management=3.1
CA NSM Job Management Option=3.0
broadcom unicenter performance management=2.4-sp3
Unicenter Software Delivery=3.0
Unicenter Software Delivery=3.1-sp1
Unicenter Software Delivery=3.1-sp2
Unicenter Software Delivery=3.1
Unicenter Software Delivery=4.0
CA Unicenter TNG=2.1
CA Unicenter TNG=2.2
CA Unicenter TNG=2.4
CA Unicenter TNG=2.4.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2005-2668?

    CVE-2005-2668 is classified as a critical vulnerability due to the potential for remote code execution.

  • How do I fix CVE-2005-2668?

    To fix CVE-2005-2668, update affected software versions to the latest build that addresses the buffer overflow vulnerabilities.

  • Which software is affected by CVE-2005-2668?

    CVE-2005-2668 affects various versions of Broadcom products including CA Message Queuing, several Unicenter management tools, and others.

  • Can CVE-2005-2668 be exploited remotely?

    Yes, an attacker can exploit CVE-2005-2668 remotely to execute arbitrary code on vulnerable systems.

  • What types of vulnerabilities does CVE-2005-2668 represent?

    CVE-2005-2668 represents multiple buffer overflow vulnerabilities that can lead to severe security risks.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203