Computer Security
[EN] securityvulns.ru no-pyccku


Multiple Symantec antiviral products Reporting Server code execution
updated since 06.06.2007
Published:11.06.2007
Source:
SecurityVulns ID:7785
Type:remote
Threat Level:
7/10
Description:It's possible to spoof executable report file. Password hash is leaked during failed logon attempt.
Affected:SYMANTEC : Symantec AntiVirus 10.1
 SYMANTEC : Symantec Client Security 3.1
CVE:CVE-2007-3022 (Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, displays the password hash for a user after a failed login attempt, which makes it easier for remote attackers to conduct brute force attacks.)
 CVE-2007-3021 (Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, does not initialize a critical variable, which allows attackers to create arbitrary executable files via unknown manipulations of a file that is created during data export.)
Original documentdocumentSYMANTEC, SYM07-011 Symantec Reporting Server password disclosure (11.06.2007)
 documentSYMANTEC, SYM07-012 Symantec Reporting Server elevation of privilege (06.06.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod