CWE
NVD-CWE-Other
Advisory Published
Updated

CVE-2005-2669

First published: Tue Aug 23 2005(Updated: )

Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
CA Unicenter Management=4.1
Broadcom Unicenter Asset Management=4.0-sp1
CA Unicenter Management=3.5
Broadcom eTrust Admin=2.1
Broadcom Unicenter Software Delivery=4.0-sp1
CA Unicenter Management=5.0.1
CA Unicenter Enterprise Job Manager=1.0-sp1
Broadcom eTrust Admin=2.9
Broadcom eTrust Admin=2.4
CA Unicenter Management=4.0
Broadcom eTrust Admin=2.7
CA Unicenter Enterprise Job Manager=1.0-sp2
CA Unicenter Management=4.0
CA Unicenter Management=5.0
CA Unicenter TNG=2.2
Broadcom Advantage Data Transport=3.0
Broadcom AdviseIT=2.4
Broadcom BrightStor Portal=11.1
Broadcom BrightStor SAN Manager=1.1
Broadcom BrightStor SAN Manager=1.1-sp1
Broadcom BrightStor SAN Manager=1.1-sp2
Broadcom BrightStor SAN Manager=11.1
Broadcom CleverPath AION=10.0
Broadcom CleverPath ECM=3.5
Broadcom CleverPath OLAP=5.1
Broadcom CleverPath Predictive Analysis Server=2.0
Broadcom CleverPath Predictive Analysis Server=3.0
Broadcom eTrust Admin=8.0
Broadcom eTrust Admin=8.1
Broadcom Message Queuing=1.5
Broadcom Message Queuing=1.7
Broadcom Message Queuing=1.11
Broadcom Unicenter Application Performance Monitor=3.0
Broadcom Unicenter Application Performance Monitor=3.5
Broadcom Unicenter Asset Management=3.1
Broadcom Unicenter Asset Management=3.2
Broadcom Unicenter Asset Management=3.2-sp1
Broadcom Unicenter Asset Management=3.2-sp2
Broadcom Unicenter Asset Management=4.0
Broadcom Unicenter Data Transport Option=2.0
Broadcom Unicenter Remote Control Option=6.0
Broadcom Unicenter Remote Control Option=6.0-sp1
Broadcom CA Service Level Management=3.0
Broadcom CA Service Level Management=3.0.1
Broadcom CA Service Level Management=3.0.2
Broadcom CA Service Level Management=3.5
Broadcom Unicenter Jasmine=3.0
Broadcom Unicenter Management Portal=2.0
Broadcom Unicenter Management Portal=3.1
Broadcom Unicenter Network and Systems Management=3.0
Broadcom Unicenter Network and Systems Management=3.1
Broadcom Unicenter NSM Wireless Network Management Option=3.0
broadcom unicenter performance management=2.4-sp3
Unicenter Software Delivery=3.0
Unicenter Software Delivery=3.1-sp1
Unicenter Software Delivery=3.1-sp2
Unicenter Software Delivery=3.1
Unicenter Software Delivery=4.0
Broadcom Unicenter TNG=2.1
Broadcom Unicenter TNG=2.2
Broadcom Unicenter TNG=2.4
Broadcom Unicenter TNG=2.4.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2005-2669?

    CVE-2005-2669 is considered to have a high severity due to its potential for remote command execution.

  • How do I fix CVE-2005-2669?

    To fix CVE-2005-2669, users should update to the latest software versions provided by the vendor.

  • Which software is affected by CVE-2005-2669?

    CVE-2005-2669 affects several versions of Broadcom's CA Message Queuing and associated Unicenter products.

  • Can CVE-2005-2669 be exploited remotely?

    Yes, CVE-2005-2669 can be exploited remotely through spoofed CAFT packets.

  • What actions should be taken if CVE-2005-2669 is identified in my environment?

    If CVE-2005-2669 is identified, it is crucial to apply the necessary patches and implement network monitoring to detect any potential exploitation.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203