CVE-2006-0529 (GCVE-0-2006-0529)

Vulnerability from cvelistv5 – Published: 2006-02-02 20:00 – Updated: 2024-08-07 16:41
VLAI?
Summary
Computer Associates (CA) Message Queuing (CAM / CAFT) before 1.07 Build 220_16 and 1.11 Build 29_20, as used in multiple CA products, allows remote attackers to cause a denial of service via a crafted message to TCP port 4105.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:41:28.431Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "16475",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16475"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://supportconnectw.ca.com/public/ca_common_docs/camessagsecurity_notice.asp"
          },
          {
            "name": "1015571",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015571"
          },
          {
            "name": "ADV-2006-0414",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0414"
          },
          {
            "name": "18681",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18681"
          },
          {
            "name": "ca-cam-port4105-dos(24448)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24448"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33581"
          },
          {
            "name": "21146",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21146"
          },
          {
            "name": "20060202 CAID 33581 - CA Message Queuing Denial of Service Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/423785/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Computer Associates (CA) Message Queuing (CAM / CAFT) before 1.07 Build 220_16 and 1.11 Build 29_20, as used in multiple CA products, allows remote attackers to cause a denial of service via a crafted message to TCP port 4105."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "16475",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16475"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://supportconnectw.ca.com/public/ca_common_docs/camessagsecurity_notice.asp"
        },
        {
          "name": "1015571",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015571"
        },
        {
          "name": "ADV-2006-0414",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0414"
        },
        {
          "name": "18681",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18681"
        },
        {
          "name": "ca-cam-port4105-dos(24448)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24448"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33581"
        },
        {
          "name": "21146",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21146"
        },
        {
          "name": "20060202 CAID 33581 - CA Message Queuing Denial of Service Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/423785/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0529",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Computer Associates (CA) Message Queuing (CAM / CAFT) before 1.07 Build 220_16 and 1.11 Build 29_20, as used in multiple CA products, allows remote attackers to cause a denial of service via a crafted message to TCP port 4105."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "16475",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16475"
            },
            {
              "name": "http://supportconnectw.ca.com/public/ca_common_docs/camessagsecurity_notice.asp",
              "refsource": "CONFIRM",
              "url": "http://supportconnectw.ca.com/public/ca_common_docs/camessagsecurity_notice.asp"
            },
            {
              "name": "1015571",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015571"
            },
            {
              "name": "ADV-2006-0414",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0414"
            },
            {
              "name": "18681",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18681"
            },
            {
              "name": "ca-cam-port4105-dos(24448)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24448"
            },
            {
              "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33581",
              "refsource": "MISC",
              "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33581"
            },
            {
              "name": "21146",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21146"
            },
            {
              "name": "20060202 CAID 33581 - CA Message Queuing Denial of Service Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/423785/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0529",
    "datePublished": "2006-02-02T20:00:00",
    "dateReserved": "2006-02-02T00:00:00",
    "dateUpdated": "2024-08-07T16:41:28.431Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2006-0529\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-02-02T20:06:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Computer Associates (CA) Message Queuing (CAM / CAFT) before 1.07 Build 220_16 and 1.11 Build 29_20, as used in multiple CA products, allows remote attackers to cause a denial of service via a crafted message to TCP port 4105.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.05:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"92B05C57-27C6-4FAC-9AA3-C9CF57DDA19B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.05:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"85E7E137-4EC4-4569-8F66-F6D666F4C931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.05:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"718B16E7-EC80-47E1-883D-17FD37699038\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.05:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"C45120C8-45B4-49DD-B0D3-A8D5C546A633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.210.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"5EFA2151-ACF6-4349-BAB9-2E3B1EF7530D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.210.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"CDE7B781-7EF4-4A01-BB3E-9C74854A143E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"1AF1DF75-B777-4671-AEA5-9EA3F003558F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.0:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"49AB97F2-D2FD-4537-9202-0D226F615869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.3:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"244132F3-C47B-43E3-8376-91A8C96FFFE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.4:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"A2D23FC9-0571-4B30-AA2E-3D665614CBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.5:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"0C68783C-2C05-429C-8CE5-1465B9713388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.5:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"AA0644FA-3EBD-42CA-BE04-9ADBB405E336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.5:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"F8CF224B-6F25-4604-93DF-1AD3B9A5BF45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.5:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"E868C8C3-888C-4CEE-8EE1-AA6A3D74714F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.6:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"86CB3DDD-218D-4779-AA44-4A8EC5CB7277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.7:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"41668716-6903-4C7D-A711-9002993F0F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.7:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"C26914B1-64D5-4373-991C-7BD23BA74E85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.7:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"4A84D100-9206-4260-B964-2F4353F1CCF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.8:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"27D477B6-362C-462B-8633-047558A7D75D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.8:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"2D090ECA-207B-49E2-8D35-5A30D21BD1DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.8:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"36BDE660-E0E7-49F3-8E22-C6AF9FDFD6FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.9:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"0615577C-58F4-47D7-9011-DEEB2535FBCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.9:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6E7588F6-70FC-4F94-ADDB-BA6827AA87BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.10:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"54EBB120-10B8-443F-873D-FF9EB3F610FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.11:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"18B208FF-0A7C-40F6-95EA-5016CF9EE259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.11:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"D96976C3-E239-4650-B038-5D23BD8A15C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.11:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"D1B3E9C7-13FB-446B-AB19-188A2AB7FA68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.11:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"FF9CD3CC-B928-4586-9B83-8F8E8D71CD14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.11:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"BF0E7CA2-8072-452A-972D-2CE4A7F9F96C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.13:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"E4AD65C2-3AFB-456E-AAD6-99CE2461143E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.13:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"8EC30A5D-ED76-428B-B265-0BA12AB54779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.13:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"B2F60D8A-FB22-4CE3-A190-8337E640F1DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.13:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"6C56A1D6-5404-494C-B079-A9A346B83BC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.13:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"562A148C-99D0-40AF-A374-97F20C60CD4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.14:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"66270725-2A1D-4E64-8478-8767C1F663EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.14:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"1B911181-328C-43F5-AAB9-B6DF182D04DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.14:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"2E2B86C6-6BFD-40D8-B68F-72586FD432EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.14:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"EAD4DB89-E5C4-4162-A610-7C6B71900F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.14:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0FFF829D-8843-49BD-B819-F47E120C7A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.15:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"069DF3A0-7393-4D00-807C-477519D003C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.15:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"78381136-7E37-4513-AD1D-DFC2909D2FC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.15:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"AC116FD6-CA21-44E0-BF34-E1C9EA91DBC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.15:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"AE8F6251-B63F-427C-B1E4-853D3EE50778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.07.220.15:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"86988EA3-B5FD-448B-8E59-9978B75C3B01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.18.0:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"68E8D9B4-B0A8-471A-A5E4-9874A584DE94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.19.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"D75A3D49-7E43-4D22-938C-111C0595C573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.19.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"82B7F0F4-5703-4E34-A853-D8BD2DECEE93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.21:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"339618A2-B9DB-49AE-991E-A97FB9DC75EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.22:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0CCE6B6A-6678-4F9E-B6D3-22D9FDA650D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.23:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CE853C05-CE93-4FEA-9612-D0B18D437BF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.24:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"74568AA8-DEFD-4D81-B1B4-7DD62C327A07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.25:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"34EB5C9A-DBF5-4ED8-8C0A-24ABDD33A300\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.26:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"A59B9C4A-1417-48DF-B486-B44384DCE936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.26.1:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"52AC781C-34E0-43B9-AD17-378A47FF25A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.26.2:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"A7D0D604-C8BC-4CCF-9FC1-2710E48CE131\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.26.6:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2D5ABE0E-04CB-42F2-9108-9D0533186B2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.26.7:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2AF7EB2D-3562-4859-BD89-8F337793F686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.26.8:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"E8CA6A19-7B69-4152-9F75-8F849DA64BEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.26.9:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"AB9F91F3-62B2-4BE4-A7F5-70C366FBB20F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.26.10:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2E994B25-AE22-433E-85C1-8C4C5419FB89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.27.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"74B71CC0-797C-4EE0-979E-6BD700CD3A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.27.0:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"40700511-3E0E-4440-A721-C4A2A6B9B55E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.27.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"37151885-A5DA-4C05-AC4D-B70DC4B77C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.27.1:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"6A486311-4EDD-420E-8F1F-C9004F476BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.27.1:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"8B7B5C2F-F473-4195-A065-5A6801E0237F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.27.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"9CDB2916-82CE-482A-8D3C-CC283D4F8E2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.27.1:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"830821A9-3600-400B-A80E-4484A1A56997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.27.2:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CA5FEA1E-DE2F-4041-98A7-DC3A7E0A7BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.27.3:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"864EACD1-851B-4980-A5DA-C2385768DDD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.28.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"C6C26471-E16B-430C-BA2C-E28D535CCD5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.0:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"A7E5D5AB-A37F-49AD-A1AF-2CF429142AA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.2:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"E1EC3C1F-41E3-467E-97DA-B361F208B956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.2:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"BAA3D191-936B-4CC7-B774-2F73AD410035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.2:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"E760A088-1798-4665-96A8-5F6F6E0B0F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.2:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"1F3D5F3D-9153-4324-89F0-D08E58716351\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.3:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"4CAA946D-3F30-409C-BDE5-7B6D14E57090\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.3:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"2443F7ED-2718-4F01-B280-B71440B92DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.3:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"6391626F-A316-4C30-B3D8-BBAC2F92858E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.3:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"10108A6A-46C8-4F72-864C-123F6AB63468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.4:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"3FB44F21-99FC-40A1-964A-E2BA477B467A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.4:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"910A7371-F68E-49C0-9F51-F1B444646C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.4:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"23FCA920-C5E0-4D04-BAF2-3F769D43497C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.4:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"5D12CF2C-73EB-4731-9D03-90D196DCF026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.5:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"87E80F38-EC8A-4344-AC47-D992BAB62E18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.5:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"BDD1662D-D97C-4FB1-845F-AAD77811313F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.5:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"9F61A088-C5D4-4F14-8E7A-F9E9376D72F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.5:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"D8B0B16F-1A58-4162-82E9-0AD84108BFCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.5:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"A4D1D831-4AE0-48D7-8C3B-4A97FF60E581\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.6:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"8B158F3B-E8A5-41B2-905D-1E430837E95B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.7:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"A972FB6D-5354-4AD4-9A31-913153660D13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.8:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"8DFAB071-37DA-45A3-B8AF-8CF51C543311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.8:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"03FBCAD4-0BD2-4E43-8636-E30584C0AEB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.8:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"1E2F2D26-D681-4F65-9367-AC164C2A6D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.8:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"C3775B53-001A-48A9-8C49-68E6B40B3A97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.8:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"159DE2EF-C851-445A-A151-DF2F3B976488\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.9:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"0C5DD419-9436-44C3-B930-9CFA1F06B1F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.9:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"67CC159F-64B0-45B5-9247-75F140B975B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.9:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"94501469-5554-48C5-800A-FF6DB55456C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.9:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"C0F3D3D5-C86B-48C3-9519-FA28C75C5108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.9:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"4F8AF1A9-DDFA-447C-8C92-6DB383C94ECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.13:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"4F1013F2-175F-4591-A825-E8B741B27D0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.13:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"A80F43C2-5E16-4C15-8BEF-A3178211C9B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.13:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"7A268994-E3FF-40C5-906A-90C65EAA61B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.13:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"47B2C9E1-3A12-49BD-BCCF-183ECB886941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.13:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"1004E5B8-1C53-49FF-8CE3-D9F2F167C8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.14:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"5D9CE76C-D04B-4199-8CD4-FF7CA49CC3F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.14:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"4C7D72BC-8279-40F8-A27E-C5B7D517D307\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.14:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"0A2A580B-16F9-4DAE-989B-2E010F1C25AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.14:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"C43670B5-4892-46D0-9F8B-7A170DDD0191\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.14:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"576B726E-02E1-4729-A1BD-D431E61560F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.15:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"8621BCAF-8506-448D-B60E-3BE2244C1294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.15:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"48366EB7-DE8B-40E2-8E53-27CABB13D005\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.15:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"A958D210-FE58-4CFC-A249-FCF7AC2BE4C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.15:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"4C4A5F8E-2984-4FA8-BC51-9ED144710B84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.15:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D3D4EB7D-1D24-4D37-82DF-D55112B34D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.16:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"7C90C982-71C7-440E-B556-88D64AD5DBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.16:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"C64482B5-DEC6-4098-973D-699BA136E699\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.16:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"F926A695-A482-4202-BFD2-C193C6638B0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.16:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"63162663-3F21-45A5-822D-511CA19E17C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.16:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"4563EF7D-9C98-4F3B-9190-22B379B45BBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.17:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"B286B402-4692-4BC1-95FE-5E9F3733A74D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.17:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"1D396EC6-0E4A-4EFA-93C7-12B098E48CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.17:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"7587EB9E-0F41-4A92-92BF-C59E90C4555D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.17:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"6535D569-C8A2-4A04-A754-A61FD3A23CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.17:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"8B262EC2-6908-4D09-B110-D5D65E3DF0A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.18:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"72F2AC87-D97B-4C83-AC7B-A1F5CAA41A97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.18:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"58441CCA-A92A-45C7-8E9C-9E955574C625\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.18:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"0DFEEB36-75FA-465D-8BC7-DE873DE4725F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.18:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"DA879B53-16D0-41E7-9D98-C6C6F6C65B64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.18:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"EEC4ACB1-DB99-491C-B55A-5DCFF753D280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.19:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"91394DF4-2B71-464B-9204-01848BD1E414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.19:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"72FEACA2-5689-4E5E-BBA1-9858D1348C00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.19:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"CB6F5A86-25E9-4102-A582-CF74723096CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.19:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"608CD4ED-FB6A-4C0B-95B2-169B911AFE2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ca:messaging:1.11.29.19:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D3D47B67-1ED3-4D7E-8EFB-D159E5AD2547\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/18681\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1015571\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://supportconnectw.ca.com/public/ca_common_docs/camessagsecurity_notice.asp\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/21146\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/423785/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/16475\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/0414\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33581\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/24448\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1015571\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://supportconnectw.ca.com/public/ca_common_docs/camessagsecurity_notice.asp\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/21146\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/423785/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/16475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/0414\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33581\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/24448\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…