Some vulnerabilities have been reported in various products within the CA Message Queuing (CAM / CAFT) software, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
1) An unspecified error in the CAM service can be exploited to cause a DoS by sending specially crafted packets to the TCP port.
2) Unspecified boundary errors can be exploited to cause buffer overflows by sending specially crafted packets to the service.
Successful exploitation allows execution of arbitrary code.
3) An error can be exploited to spoof CAFT and execute arbitrary commands with escalated privileges.
The vulnerabilities affect all versions of the CA Message Queuing software prior to versions 1.07 Build 220_13 and 1.11 Build 29_13.
NOTE: An exploit for the vulnerability is publicly available.
Solution: Apply patches (see vendor advisory for details).
Provided and/or discovered by: Reported by vendor.
Original Advisory: Computer Associates:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: CA Various Products Message Queuing Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.