Computer Security
[EN] securityvulns.ru no-pyccku


Symantec Client Security buffer overflow
Published:01.05.2009
Source:
SecurityVulns ID:9887
Type:remote
Threat Level:
6/10
Description:Buffer overflow in TCP/38292 Alert Originator service.
Affected:SYMANTEC : Symantec Client Security 2.0
 SYMANTEC : Symantec AntiVirus 9.0
 SYMANTEC : Symantec AntiVirus 10.0
 SYMANTEC : Symantec AntiVirus 10.1
 SYMANTEC : Symantec Client Security 3.0
 SYMANTEC : Symantec Client Security 3.1
 SYMANTEC : Symantec AntiVirus 10.2
 SYMANTEC : Symantec Endpoint Protection 11.0
CVE:CVE-2009-1430 (Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process.)
Original documentdocumentZDI, ZDI-09-018: Symantec Client Security Alert Originator Service Stack Overflow Vulnerability (01.05.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod