Vulnerabilities > CVE-2007-0060
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104.
Vulnerable Configurations
Nessus
NASL family | Gain a shell remotely |
NASL id | CACAM_OVERFLOW2.NASL |
description | The remote version of CA Message Queuing Service contains a stack overflow that may allow an attacker to execute arbitrary code on the remote host with SYSTEM privileges. An attacker does not need to be authenticated to exploit this flaw. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25766 |
published | 2007-07-26 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25766 |
title | CA Multiple Products Message Queuing Server (Cam.exe) Remote Overflow |
code |
|
References
- http://secunia.com/advisories/26190
- http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp
- http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149809
- http://www.iss.net/threats/272.html
- http://www.securityfocus.com/archive/1/474602/100/0/threaded
- http://www.securityfocus.com/bid/25051
- http://www.securitytracker.com/id?1018449
- http://www.vupen.com/english/advisories/2007/2638
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32234