Vulnerabilites related to symantec - altiris_notification_server
CVE-2009-3028 (GCVE-0-2009-3028)
Vulnerability from cvelistv5
Published
2011-03-07 20:00
Modified
2024-08-07 06:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:14:55.381Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36346", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36346" }, { "name": "57893", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/57893" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20090922_00" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/business/support/index?page=content\u0026id=TECH44885" }, { "name": "36679", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36679" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-07T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "36346", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36346" }, { "name": "57893", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/57893" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20090922_00" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/business/support/index?page=content\u0026id=TECH44885" }, { "name": "36679", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36679" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3028", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36346", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36346" }, { "name": "57893", "refsource": "OSVDB", "url": "http://www.osvdb.org/57893" }, { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20090922_00", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20090922_00" }, { "name": "http://www.symantec.com/business/support/index?page=content\u0026id=TECH44885", "refsource": "CONFIRM", "url": "http://www.symantec.com/business/support/index?page=content\u0026id=TECH44885" }, { "name": "36679", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36679" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3028", "datePublished": "2011-03-07T20:00:00", "dateReserved": "2009-08-31T00:00:00", "dateUpdated": "2024-08-07T06:14:55.381Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3035 (GCVE-0-2009-3035)
Vulnerability from cvelistv5
Published
2010-02-02 16:25
Modified
2024-08-07 06:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The web console in Symantec Altiris Notification Server 6.0.x before 6.0 SP3 R12 uses a hardcoded key that can decrypt SQL Server credentials and certain discovery credentials, and stores this key on the Notification Server machine, which allows local users to obtain sensitive information and possibly execute arbitrary code by decrypting and using these credentials.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:14:56.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38356", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38356" }, { "name": "37953", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37953" }, { "name": "62010", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/62010" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100128_00" }, { "name": "1023521", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023521" }, { "name": "symantec-ans-key-unauth-access(55952)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55952" }, { "name": "ADV-2010-0256", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0256" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The web console in Symantec Altiris Notification Server 6.0.x before 6.0 SP3 R12 uses a hardcoded key that can decrypt SQL Server credentials and certain discovery credentials, and stores this key on the Notification Server machine, which allows local users to obtain sensitive information and possibly execute arbitrary code by decrypting and using these credentials." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "38356", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38356" }, { "name": "37953", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37953" }, { "name": "62010", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/62010" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100128_00" }, { "name": "1023521", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023521" }, { "name": "symantec-ans-key-unauth-access(55952)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55952" }, { "name": "ADV-2010-0256", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0256" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The web console in Symantec Altiris Notification Server 6.0.x before 6.0 SP3 R12 uses a hardcoded key that can decrypt SQL Server credentials and certain discovery credentials, and stores this key on the Notification Server machine, which allows local users to obtain sensitive information and possibly execute arbitrary code by decrypting and using these credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38356", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38356" }, { "name": "37953", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37953" }, { "name": "62010", "refsource": "OSVDB", "url": "http://osvdb.org/62010" }, { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100128_00", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100128_00" }, { "name": "1023521", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023521" }, { "name": "symantec-ans-key-unauth-access(55952)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55952" }, { "name": "ADV-2010-0256", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0256" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3035", "datePublished": "2010-02-02T16:25:00", "dateReserved": "2009-08-31T00:00:00", "dateUpdated": "2024-08-07T06:14:56.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2794 (GCVE-0-2008-2794)
Vulnerability from cvelistv5
Published
2008-06-20 10:00
Modified
2024-08-07 09:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the GUI in Symantec Altiris Notification Server Agent 6.x before 6.0 SP3 R8 allows local users to gain privileges via unknown attack vectors.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:14:14.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "30741", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30741" }, { "name": "ADV-2008-1861", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1861/references" }, { "name": "29708", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29708" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.06.17.html" }, { "name": "1020304", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020304" }, { "name": "symantec-ans-agent-privilege-escalation(43154)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43154" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the GUI in Symantec Altiris Notification Server Agent 6.x before 6.0 SP3 R8 allows local users to gain privileges via unknown attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "30741", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30741" }, { "name": "ADV-2008-1861", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1861/references" }, { "name": "29708", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29708" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.06.17.html" }, { "name": "1020304", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020304" }, { "name": "symantec-ans-agent-privilege-escalation(43154)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43154" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-2794", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the GUI in Symantec Altiris Notification Server Agent 6.x before 6.0 SP3 R8 allows local users to gain privileges via unknown attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "30741", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30741" }, { "name": "ADV-2008-1861", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1861/references" }, { "name": "29708", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29708" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2008.06.17.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.06.17.html" }, { "name": "1020304", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020304" }, { "name": "symantec-ans-agent-privilege-escalation(43154)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43154" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2794", "datePublished": "2008-06-20T10:00:00", "dateReserved": "2008-06-19T00:00:00", "dateUpdated": "2024-08-07T09:14:14.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0716 (GCVE-0-2008-0716)
Vulnerability from cvelistv5
Published
2008-02-12 01:00
Modified
2024-08-07 07:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The agent in Symantec Altiris Notification Server before 6.0 SP3 R7 allows local users to gain privileges via a "Shatter" style attack.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:22.851Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28832", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28832" }, { "name": "ADV-2008-0444", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0444" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.02.06.html" }, { "name": "1019313", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019313" }, { "name": "27645", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27645" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The agent in Symantec Altiris Notification Server before 6.0 SP3 R7 allows local users to gain privileges via a \"Shatter\" style attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28832", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28832" }, { "name": "ADV-2008-0444", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0444" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.02.06.html" }, { "name": "1019313", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019313" }, { "name": "27645", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27645" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0716", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The agent in Symantec Altiris Notification Server before 6.0 SP3 R7 allows local users to gain privileges via a \"Shatter\" style attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28832", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28832" }, { "name": "ADV-2008-0444", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0444" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2008.02.06.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.02.06.html" }, { "name": "1019313", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019313" }, { "name": "27645", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27645" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0716", "datePublished": "2008-02-12T01:00:00", "dateReserved": "2008-02-11T00:00:00", "dateUpdated": "2024-08-07T07:54:22.851Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3031 (GCVE-0-2009-3031)
Vulnerability from cvelistv5
Published
2009-11-03 16:00
Modified
2024-08-07 06:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:14:56.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://sotiriu.de/adv/NSOADV-2009-001.txt" }, { "name": "36698", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36698" }, { "name": "ADV-2009-3117", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3117" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091102_00" }, { "name": "20091102 NSOADV-2009-001: Symantec ConsoleUtilities ActiveX Control Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507625/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.altiris.com/article.asp?article=49568\u0026p=1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.altiris.com/article.asp?article=49389\u0026p=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://sotiriu.de/adv/NSOADV-2009-001.txt" }, { "name": "36698", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36698" }, { "name": "ADV-2009-3117", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3117" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091102_00" }, { "name": "20091102 NSOADV-2009-001: Symantec ConsoleUtilities ActiveX Control Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507625/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.altiris.com/article.asp?article=49568\u0026p=1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.altiris.com/article.asp?article=49389\u0026p=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sotiriu.de/adv/NSOADV-2009-001.txt", "refsource": "MISC", "url": "http://sotiriu.de/adv/NSOADV-2009-001.txt" }, { "name": "36698", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36698" }, { "name": "ADV-2009-3117", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3117" }, { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091102_00", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091102_00" }, { "name": "20091102 NSOADV-2009-001: Symantec ConsoleUtilities ActiveX Control Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507625/100/0/threaded" }, { "name": "https://kb.altiris.com/article.asp?article=49568\u0026p=1", "refsource": "CONFIRM", "url": "https://kb.altiris.com/article.asp?article=49568\u0026p=1" }, { "name": "https://kb.altiris.com/article.asp?article=49389\u0026p=1", "refsource": "CONFIRM", "url": "https://kb.altiris.com/article.asp?article=49389\u0026p=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3031", "datePublished": "2009-11-03T16:00:00", "dateReserved": "2009-08-31T00:00:00", "dateUpdated": "2024-08-07T06:14:56.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3033 (GCVE-0-2009-3033)
Vulnerability from cvelistv5
Published
2009-11-25 16:00
Modified
2024-08-07 06:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:14:55.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37092", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37092" }, { "name": "ADV-2009-3328", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3328" }, { "name": "symantec-console-utilities-bo(54415)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54415" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.altiris.com/article.asp?article=50072\u0026p=1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.altiris.com/article.asp?article=50279\u0026p=1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091124_00" }, { "name": "60496", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/60496" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37092", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37092" }, { "name": "ADV-2009-3328", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3328" }, { "name": "symantec-console-utilities-bo(54415)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54415" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.altiris.com/article.asp?article=50072\u0026p=1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.altiris.com/article.asp?article=50279\u0026p=1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091124_00" }, { "name": "60496", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/60496" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3033", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37092", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37092" }, { "name": "ADV-2009-3328", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3328" }, { "name": "symantec-console-utilities-bo(54415)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54415" }, { "name": "https://kb.altiris.com/article.asp?article=50072\u0026p=1", "refsource": "CONFIRM", "url": "https://kb.altiris.com/article.asp?article=50072\u0026p=1" }, { "name": "https://kb.altiris.com/article.asp?article=50279\u0026p=1", "refsource": "CONFIRM", "url": "https://kb.altiris.com/article.asp?article=50279\u0026p=1" }, { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091124_00", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091124_00" }, { "name": "60496", "refsource": "OSVDB", "url": "http://osvdb.org/60496" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3033", "datePublished": "2009-11-25T16:00:00", "dateReserved": "2009-08-31T00:00:00", "dateUpdated": "2024-08-07T06:14:55.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2011-03-07 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*", "matchCriteriaId": "F0002047-0965-4086-A5E6-AEC02200B6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*", "matchCriteriaId": "EBD29C7F-B147-4CDE-8AC3-FCA6CA15C464", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*", "matchCriteriaId": "4DC0FB60-BF58-455B-B5D1-97EDF2D6D0E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*", "matchCriteriaId": "3ACB4D1D-08D2-424B-B4F6-13FCDF034833", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp4:*:*:*:*:*:*", "matchCriteriaId": "EE56560F-6F51-479E-B69F-3F750C8A2F31", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "68AF67FB-5FC8-4EAA-AF09-35D4740B967F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "0B096EB3-F1E7-4933-972A-0E142CA854A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1_hf12:*:*:*:*:*:*", "matchCriteriaId": "9FBCFF03-8C4F-4452-B841-36FEEB95E6F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "0C13D2DE-7EA0-4963-BA60-5D01E037D954", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "8D085BB2-1012-4386-AEE9-31870673BF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r1:*:*:*:*:*:*", "matchCriteriaId": "ADDD1F0C-3B7B-4D32-933A-A7D3E65B6049", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r10:*:*:*:*:*:*", "matchCriteriaId": "268EEE3E-B7D2-4739-80CB-64284A86CDA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r11:*:*:*:*:*:*", "matchCriteriaId": "00A3F84C-1C78-4AD9-9EFD-C3E8F0935224", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r12:*:*:*:*:*:*", "matchCriteriaId": "32BA7815-2572-496E-AC6E-4323813EEF96", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r13:*:*:*:*:*:*", "matchCriteriaId": "7305D8F0-3928-434D-ADAE-788096731CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r2:*:*:*:*:*:*", "matchCriteriaId": "4E4DF22A-2516-41F2-B89C-F2424A6C56A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r3:*:*:*:*:*:*", "matchCriteriaId": "419553B5-49BC-4789-BD32-959CF479062E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r4:*:*:*:*:*:*", "matchCriteriaId": "9CB72176-8471-443B-BF06-829A51CCF71E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r5:*:*:*:*:*:*", "matchCriteriaId": "4217C68A-2B6A-4C62-88F1-3D22C1BAE7F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r6:*:*:*:*:*:*", "matchCriteriaId": "B1D0DA71-27E9-4AD8-8D73-2F311646E989", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*", "matchCriteriaId": "5E187D85-9F75-4749-9682-29F66D919E12", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r8:*:*:*:*:*:*", "matchCriteriaId": "548B4DF2-D7EC-4BE7-BA52-2BDEF5577F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r9:*:*:*:*:*:*", "matchCriteriaId": "EC6B03D5-0E10-43CE-9B9A-4E232FF4FAEF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:management_platform:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B04B5F5-B488-4F85-9CEB-739E8B99FC54", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:management_platform:7.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "F153884E-6C9B-4E33-9D01-804AD1FE99A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:management_platform:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "03C0AEC5-CB51-455B-A76B-F3F7D60F884A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:management_platform:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "D740F499-2924-4807-AACE-A60391F9EF52", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:management_platform:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "9A6EB8C4-3D2B-4A78-A670-418B36F0F0EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:management_platform:7.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "25FDAAB9-F0E2-448A-B5E8-2E12EE3E2BBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:management_platform:7.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "F26C12D4-2DC0-4BE2-A4ED-B58EE433352A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method." }, { "lang": "es", "value": "En Altiris eXpress NS SC la descarga del control ActiveX en AeXNSPkgDLLib.dll, como en Symantec Altiris Deployment Solution v6.9.x, Notification Server v6.0.x, y Symantec Management Platform v7.0.x expone un m\u00e9todo inseguro, que permite a atacantes remotos forzar la descarga de archivos arbitrarios y, posiblemente, ejecutar c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo DownloadAndInstall." } ], "id": "CVE-2009-3028", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-03-07T21:00:01.110", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36679" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/57893" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/36346" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.symantec.com/business/support/index?page=content\u0026id=TECH44885" }, { "source": "cve@mitre.org", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20090922_00" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/57893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/36346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.symantec.com/business/support/index?page=content\u0026id=TECH44885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20090922_00" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-25 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*", "matchCriteriaId": "F0002047-0965-4086-A5E6-AEC02200B6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*", "matchCriteriaId": "EBD29C7F-B147-4CDE-8AC3-FCA6CA15C464", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*", "matchCriteriaId": "4DC0FB60-BF58-455B-B5D1-97EDF2D6D0E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*", "matchCriteriaId": "3ACB4D1D-08D2-424B-B4F6-13FCDF034833", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9.164:*:*:*:*:*:*:*", "matchCriteriaId": "BA744B2A-B81E-4E97-A720-307041478B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9.176:*:*:*:*:*:*:*", "matchCriteriaId": "E9301CFC-5925-4249-8439-5E2BBAF06687", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9.355:*:*:*:*:*:*:*", "matchCriteriaId": "E4070F9F-F63E-4708-8DA0-339A777383B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9.355:sp1:*:*:*:*:*:*", "matchCriteriaId": "5C9DD5AC-7E4C-4A62-A5B3-B179359635A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_management_platform:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "72B538F1-CB05-495B-A3F3-24395A1F3B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_management_platform:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "755E4F35-FEAB-488D-825B-C23AF31F03A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "68AF67FB-5FC8-4EAA-AF09-35D4740B967F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "0B096EB3-F1E7-4933-972A-0E142CA854A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "0C13D2DE-7EA0-4963-BA60-5D01E037D954", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "8D085BB2-1012-4386-AEE9-31870673BF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*", "matchCriteriaId": "5E187D85-9F75-4749-9682-29F66D919E12", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0_sp3:*:*:*:*:*:*:*", "matchCriteriaId": "9E437831-40EF-437D-A045-DBF6CF3CB0C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el m\u00e9todo RunCmd en Altiris eXpress NS Console Utilities ActiveX control en AeXNSConsoleUtilities.dll en la consola web de Symantec Altiris Deployment Solution v6.9.x, Altiris Notification Server v6.0.x, y Management Platform v7.0.x permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una cadena larga en el segundo argumento." } ], "id": "CVE-2009-3033", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-25T16:30:00.750", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/60496" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/37092" }, { "source": "cve@mitre.org", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091124_00" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3328" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54415" }, { "source": "cve@mitre.org", "url": "https://kb.altiris.com/article.asp?article=50072\u0026p=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://kb.altiris.com/article.asp?article=50279\u0026p=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/60496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/37092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091124_00" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kb.altiris.com/article.asp?article=50072\u0026p=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://kb.altiris.com/article.asp?article=50279\u0026p=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-02-02 16:30
Modified
2025-04-11 00:51
Severity ?
Summary
The web console in Symantec Altiris Notification Server 6.0.x before 6.0 SP3 R12 uses a hardcoded key that can decrypt SQL Server credentials and certain discovery credentials, and stores this key on the Notification Server machine, which allows local users to obtain sensitive information and possibly execute arbitrary code by decrypting and using these credentials.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | altiris_notification_server | 6.0 | |
symantec | altiris_notification_server | 6.0 | |
symantec | altiris_notification_server | 6.0 | |
symantec | altiris_notification_server | 6.0 | |
symantec | altiris_notification_server | 6.0 | |
symantec | altiris_notification_server | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "68AF67FB-5FC8-4EAA-AF09-35D4740B967F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "0B096EB3-F1E7-4933-972A-0E142CA854A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "0C13D2DE-7EA0-4963-BA60-5D01E037D954", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "8D085BB2-1012-4386-AEE9-31870673BF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*", "matchCriteriaId": "5E187D85-9F75-4749-9682-29F66D919E12", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r8:*:*:*:*:*:*", "matchCriteriaId": "548B4DF2-D7EC-4BE7-BA52-2BDEF5577F49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web console in Symantec Altiris Notification Server 6.0.x before 6.0 SP3 R12 uses a hardcoded key that can decrypt SQL Server credentials and certain discovery credentials, and stores this key on the Notification Server machine, which allows local users to obtain sensitive information and possibly execute arbitrary code by decrypting and using these credentials." }, { "lang": "es", "value": "La consola web Symantec Altiris Notification Server v6.0.x anterior a v6.0 SP3 R12, usa una clave embebida que puede descifrar las credenciales del servidor SQL y otro tipo de credenciales. Almacena esta clave en la m\u00e1quina Notification Server, lo que permite a usuarios locales obtener informaci\u00f3n sensible y posiblemente, ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de estas credenciales." } ], "id": "CVE-2009-3035", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-02-02T16:30:02.127", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/62010" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38356" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/37953" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023521" }, { "source": "cve@mitre.org", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100128_00" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2010/0256" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/62010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38356" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100128_00" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/0256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55952" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-02-12 02:00
Modified
2025-04-09 00:30
Severity ?
Summary
The agent in Symantec Altiris Notification Server before 6.0 SP3 R7 allows local users to gain privileges via a "Shatter" style attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | altiris_notification_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA0A3B9D-9399-4120-A3EB-3BCD1010058C", "versionEndIncluding": "6.0_sp3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The agent in Symantec Altiris Notification Server before 6.0 SP3 R7 allows local users to gain privileges via a \"Shatter\" style attack." }, { "lang": "es", "value": "El agente de Symantec Altiris Notification Server en versiones anteriores a la 6.0 SP3 R7 permite a usuarios locales obtener privilegios a trav\u00e9s de un ataque estilo \"destrozar\" (Shatter)." } ], "id": "CVE-2008-0716", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-12T02:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28832" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.02.06.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27645" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019313" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.02.06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0444" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-03 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*", "matchCriteriaId": "F0002047-0965-4086-A5E6-AEC02200B6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*", "matchCriteriaId": "EBD29C7F-B147-4CDE-8AC3-FCA6CA15C464", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*", "matchCriteriaId": "4DC0FB60-BF58-455B-B5D1-97EDF2D6D0E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*", "matchCriteriaId": "3ACB4D1D-08D2-424B-B4F6-13FCDF034833", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_management_platform:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "72B538F1-CB05-495B-A3F3-24395A1F3B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_management_platform:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "755E4F35-FEAB-488D-825B-C23AF31F03A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "68AF67FB-5FC8-4EAA-AF09-35D4740B967F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:*:sp1:*:*:*:*:*", "matchCriteriaId": "214688D3-0653-4FDD-89C3-25E62BA050F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "0C13D2DE-7EA0-4963-BA60-5D01E037D954", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "8D085BB2-1012-4386-AEE9-31870673BF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*", "matchCriteriaId": "5E187D85-9F75-4749-9682-29F66D919E12", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "C048C7FD-700F-4388-A1ED-16A6ECB31B66", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "EB49276E-A0B9-4E74-9A45-928BC6A99E3B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el m\u00e9todo BrowseAndSaveFile en el control ActiveX ConsoleUtilities v6.0.0.1846 en AeXNSConsoleUtilities.dll en Symantec Altiris Notification Server (NS) v6.0 anterior a R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution v6.9 SP3, y Symantec Management Platform (SMP) v7.0 anterior a SP3, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una cadena larga en el segundo argumento." } ], "id": "CVE-2009-3031", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-03T16:30:10.077", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://sotiriu.de/adv/NSOADV-2009-001.txt" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507625/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/36698" }, { "source": "cve@mitre.org", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091102_00" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3117" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.altiris.com/article.asp?article=49389\u0026p=1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.altiris.com/article.asp?article=49568\u0026p=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://sotiriu.de/adv/NSOADV-2009-001.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507625/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/36698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091102_00" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.altiris.com/article.asp?article=49389\u0026p=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.altiris.com/article.asp?article=49568\u0026p=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-06-20 11:48
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the GUI in Symantec Altiris Notification Server Agent 6.x before 6.0 SP3 R8 allows local users to gain privileges via unknown attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | altiris_notification_server | 6.0 | |
symantec | altiris_notification_server | 6.0 | |
symantec | altiris_notification_server | 6.0 | |
symantec | altiris_notification_server | 6.0 | |
symantec | altiris_notification_server | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "68AF67FB-5FC8-4EAA-AF09-35D4740B967F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:*:sp1:*:*:*:*:*", "matchCriteriaId": "214688D3-0653-4FDD-89C3-25E62BA050F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "0C13D2DE-7EA0-4963-BA60-5D01E037D954", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "8D085BB2-1012-4386-AEE9-31870673BF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*", "matchCriteriaId": "5E187D85-9F75-4749-9682-29F66D919E12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the GUI in Symantec Altiris Notification Server Agent 6.x before 6.0 SP3 R8 allows local users to gain privileges via unknown attack vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el GUI de Symantec Altiris Notification Server Agent versiones 6.x anteriores a 6.0 SP3 R8 permite a usuarios locales obtener mayores privilegios mediante vectores de ataque desconocidos." } ], "id": "CVE-2008-2794", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-06-20T11:48:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30741" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.06.17.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/29708" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020304" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1861/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.06.17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/29708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1861/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43154" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }