First published: Tue Aug 23 2005(Updated: )
Computer Associates (CA) Message Queuing (CAM / CAFT) 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13 allows remote attackers to execute arbitrary commands via spoofed CAFT packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA Unicenter Management | =4.1 | |
Broadcom Unicenter Asset Management | =4.0-sp1 | |
CA Unicenter Management | =3.5 | |
Broadcom eTrust Admin | =2.1 | |
Broadcom Unicenter Software Delivery | =4.0-sp1 | |
CA Unicenter Management | =5.0.1 | |
CA Unicenter Enterprise Job Manager | =1.0-sp1 | |
Broadcom eTrust Admin | =2.9 | |
Broadcom eTrust Admin | =2.4 | |
CA Unicenter Management | =4.0 | |
Broadcom eTrust Admin | =2.7 | |
CA Unicenter Enterprise Job Manager | =1.0-sp2 | |
CA Unicenter Management | =4.0 | |
CA Unicenter Management | =5.0 | |
CA Unicenter TNG | =2.2 | |
Broadcom Advantage Data Transport | =3.0 | |
Broadcom AdviseIT | =2.4 | |
Broadcom BrightStor Portal | =11.1 | |
Broadcom BrightStor SAN Manager | =1.1 | |
Broadcom BrightStor SAN Manager | =1.1-sp1 | |
Broadcom BrightStor SAN Manager | =1.1-sp2 | |
Broadcom BrightStor SAN Manager | =11.1 | |
Broadcom CleverPath AION | =10.0 | |
Broadcom CleverPath ECM | =3.5 | |
Broadcom CleverPath OLAP | =5.1 | |
Broadcom CleverPath Predictive Analysis Server | =2.0 | |
Broadcom CleverPath Predictive Analysis Server | =3.0 | |
Broadcom eTrust Admin | =8.0 | |
Broadcom eTrust Admin | =8.1 | |
Broadcom Message Queuing | =1.5 | |
Broadcom Message Queuing | =1.7 | |
Broadcom Message Queuing | =1.11 | |
Broadcom Unicenter Application Performance Monitor | =3.0 | |
Broadcom Unicenter Application Performance Monitor | =3.5 | |
Broadcom Unicenter Asset Management | =3.1 | |
Broadcom Unicenter Asset Management | =3.2 | |
Broadcom Unicenter Asset Management | =3.2-sp1 | |
Broadcom Unicenter Asset Management | =3.2-sp2 | |
Broadcom Unicenter Asset Management | =4.0 | |
Broadcom Unicenter Data Transport Option | =2.0 | |
Broadcom Unicenter Remote Control Option | =6.0 | |
Broadcom Unicenter Remote Control Option | =6.0-sp1 | |
Broadcom CA Service Level Management | =3.0 | |
Broadcom CA Service Level Management | =3.0.1 | |
Broadcom CA Service Level Management | =3.0.2 | |
Broadcom CA Service Level Management | =3.5 | |
Broadcom Unicenter Jasmine | =3.0 | |
Broadcom Unicenter Management Portal | =2.0 | |
Broadcom Unicenter Management Portal | =3.1 | |
Broadcom Unicenter Network and Systems Management | =3.0 | |
Broadcom Unicenter Network and Systems Management | =3.1 | |
Broadcom Unicenter NSM Wireless Network Management Option | =3.0 | |
broadcom unicenter performance management | =2.4-sp3 | |
Unicenter Software Delivery | =3.0 | |
Unicenter Software Delivery | =3.1-sp1 | |
Unicenter Software Delivery | =3.1-sp2 | |
Unicenter Software Delivery | =3.1 | |
Unicenter Software Delivery | =4.0 | |
Broadcom Unicenter TNG | =2.1 | |
Broadcom Unicenter TNG | =2.2 | |
Broadcom Unicenter TNG | =2.4 | |
Broadcom Unicenter TNG | =2.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2669 is considered to have a high severity due to its potential for remote command execution.
To fix CVE-2005-2669, users should update to the latest software versions provided by the vendor.
CVE-2005-2669 affects several versions of Broadcom's CA Message Queuing and associated Unicenter products.
Yes, CVE-2005-2669 can be exploited remotely through spoofed CAFT packets.
If CVE-2005-2669 is identified, it is crucial to apply the necessary patches and implement network monitoring to detect any potential exploitation.