Korean
<< Back
VID 23157
Severity 30
Port 4105
Protocol TCP
Class Daemon
Detailed Description The CA Message Queuing Service, according to its version number, has two denial of service vulnerabilities. CA Message Queuing (CAM/CAFT) software is a common component included with multiple Computer Associates' products. CA Message Queuing (CAM/CAFT) software version 1.05 and versions prior to 1.07 Build 220_16 and prior to 1.11 Build 29_20 is vulnerable to two denial of service attacks as follows:

1) An error in the handling of certain specially crafted messages sent to port 4105/tcp can be exploited to cause a DoS.
2) An error in the handling CAM control messages can be exploited to cause a DoS via spoofed CAM control messages.

* References:
http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp
http://secunia.com/advisories/18681/
http://archives.neohapsis.com/archives/bugtraq/2006-02/0021.html

* Platforms Affected:
Computer Associates, Message Queuing (CAM / CAFT) version 1.05
Computer Associates, Message Queuing (CAM / CAFT) versions 1.07 prior to Build 220_16
Computer Associates, Message Queuing (CAM / CAFT) versions 1.11 prior to Build 29_20
Any operating system Any version
Recommendation Computer Associates has released a set of patches for CAM 1.05, 1.07 and 1.11. Upgrade to the latest version of CA Message Queuing software (v1.07 Build 220_16 or later) or (v1.11 Build 29_20 or later), as listed in the CA Message Queuing Security Notice at http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp
Related URL CVE-2006-0529,CVE-2006-0530 (CVE)
Related URL 16475 (SecurityFocus)
Related URL 24448,24449 (ISS)