Unrated severityNVD Advisory· Published Jul 26, 2007· Updated Apr 23, 2026
CVE-2007-0060
CVE-2007-0060
Description
Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104.
Affected products
52- cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:brightstor_san_manager:11.5:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*
- cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*
cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*
cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*+ 4 more
- cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*
- cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*
- cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*
- cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*
- cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*
- cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- secunia.com/advisories/26190nvdThird Party Advisory
- supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.aspnvdVendor Advisory
- www.ca.com/us/securityadvisor/newsinfo/collateral.aspxnvdVendor Advisory
- www.securityfocus.com/bid/25051nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.vupen.com/english/advisories/2007/2638nvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/32234nvdThird Party AdvisoryVDB Entry
- www.iss.net/threats/272.htmlnvdBroken Link
- www.securityfocus.com/archive/1/474602/100/0/threadednvd
News mentions
0No linked articles in our index yet.