CVE-2005-3653
Summary
| CVE | CVE-2005-3653 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-12-31 05:00:00 UTC |
| Updated | 2021-04-14 15:41:00 UTC |
| Description | Heap-based buffer overflow in the iGateway service for various Computer Associates (CA) iTechnology products, in iTechnology iGateway before 4.0.051230, allows remote attackers to execute arbitrary code via an HTTP request with a negative Content-Length field. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SupportConnect - Important Security Notice for CA iGateway (Buffer Overrun) | CONFIRM | supportconnectw.ca.com | Patch, Vendor Advisory |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| 22688 | OSVDB | www.osvdb.org | Patch |
| Computer Associates iTechnology iGateway Service Content-Length Heap Overflow Vulnerability | BID | www.securityfocus.com | Patch |
| '[Full-disclosure] CAID 33778 - CA iGateway Content-Length Buffer' - MARC | FULLDISC | marc.info | |
| Secunia - Advisories - CA Products iGateway Service Content-Length Buffer Overflow | SECUNIA | secunia.com | Patch, Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Vendor Advisory |
| CA iTechnology iGateway service HTTP Content-Length buffer overflow vulnerability | CONFIRM | www3.ca.com | |
| SecurityTracker.com Archives - Computer Associates Content-Length Buffer Overflow in iGateway Lets Remote Users Execute Arbitrary Code | SECTRACK | securitytracker.com | Patch |
| SecurityReason | SREASON | securityreason.com | |
| Current Intelligence // Advisory: 01.23.06 // iDefense, A VeriSign Company | IDEFENSE | www.idefense.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.