Vulnerabilites related to symantec - pcanywhere
cve-2005-3934
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/17797 | third-party-advisory, x_refsource_SECUNIA | |
http://www.symantec.com/avcenter/security/Content/2005.11.29.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/15646 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1015284 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2005/2658 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/23298 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:31:48.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "17797", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17797" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2005.11.29.html" }, { "name": "15646", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15646" }, { "name": "1015284", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015284" }, { "name": "ADV-2005-2658", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2658" }, { "name": "symantec-pcanywhere-bo(23298)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23298" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Symantec pcAnywhere 11.0.1, 11.5.1, and all other 32-bit versions allows remote attackers to cause a denial of service (application crash) via unknown attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "17797", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17797" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2005.11.29.html" }, { "name": "15646", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15646" }, { "name": "1015284", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015284" }, { "name": "ADV-2005-2658", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2658" }, { "name": "symantec-pcanywhere-bo(23298)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23298" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3934", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Symantec pcAnywhere 11.0.1, 11.5.1, and all other 32-bit versions allows remote attackers to cause a denial of service (application crash) via unknown attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "17797", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17797" }, { "name": "http://www.symantec.com/avcenter/security/Content/2005.11.29.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2005.11.29.html" }, { "name": "15646", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15646" }, { "name": "1015284", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015284" }, { "name": "ADV-2005-2658", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2658" }, { "name": "symantec-pcanywhere-bo(23298)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23298" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3934", "datePublished": "2005-12-01T11:00:00", "dateReserved": "2005-12-01T00:00:00", "dateUpdated": "2024-08-07T23:31:48.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-3786
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1016534 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/440448/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.digitalbullets.org/?p=3 | x_refsource_MISC | |
http://securityreason.com/securityalert/1261 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:39:54.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1016534", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016534" }, { "name": "20060718 PcAnywhere \u003e 12 Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.digitalbullets.org/?p=3" }, { "name": "1261", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1261" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 12.5 uses weak integrity protection for .cif (aka caller or CallerID) files, which allows local users to generate a custom .cif file and modify the superuser flag." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1016534", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016534" }, { "name": "20060718 PcAnywhere \u003e 12 Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.digitalbullets.org/?p=3" }, { "name": "1261", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1261" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3786", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec pcAnywhere 12.5 uses weak integrity protection for .cif (aka caller or CallerID) files, which allows local users to generate a custom .cif file and modify the superuser flag." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1016534", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016534" }, { "name": "20060718 PcAnywhere \u003e 12 Local Privilege Escalation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "name": "http://www.digitalbullets.org/?p=3", "refsource": "MISC", "url": "http://www.digitalbullets.org/?p=3" }, { "name": "1261", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1261" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3786", "datePublished": "2006-07-21T21:00:00", "dateReserved": "2006-07-21T00:00:00", "dateUpdated": "2024-08-07T18:39:54.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0936
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securityresponse.symantec.com/avcenter/security/Content/2003.11.13.html | x_refsource_CONFIRM | |
http://marc.info/?l=bugtraq&m=106876107330752&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://marc.info/?l=bugtraq&m=106875764826251&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:34.843Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2003.11.13.html" }, { "name": "20031113 RE: Secure Network Operations SRT2003-11-13-0218, PCAnywhere allows local users to become SYSTEM", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106876107330752\u0026w=2" }, { "name": "20031113 SRT2003-11-13-0218 - PCAnywhere local SYSTEM exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106875764826251\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-11-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec PCAnywhere 10.x and 11, when started as a service, allows attackers to gain SYSTEM privileges via the help interface using AWHOST32.exe." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2003.11.13.html" }, { "name": "20031113 RE: Secure Network Operations SRT2003-11-13-0218, PCAnywhere allows local users to become SYSTEM", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=106876107330752\u0026w=2" }, { "name": "20031113 SRT2003-11-13-0218 - PCAnywhere local SYSTEM exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=106875764826251\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0936", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec PCAnywhere 10.x and 11, when started as a service, allows attackers to gain SYSTEM privileges via the help interface using AWHOST32.exe." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2003.11.13.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2003.11.13.html" }, { "name": "20031113 RE: Secure Network Operations SRT2003-11-13-0218, PCAnywhere allows local users to become SYSTEM", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=106876107330752\u0026w=2" }, { "name": "20031113 SRT2003-11-13-0218 - PCAnywhere local SYSTEM exploit", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=106875764826251\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0936", "datePublished": "2003-11-18T05:00:00", "dateReserved": "2003-11-10T00:00:00", "dateUpdated": "2024-08-08T02:12:34.843Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-3785
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/440448/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.digitalbullets.org/?p=3 | x_refsource_MISC | |
http://securityreason.com/securityalert/1261 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:39:54.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060718 PcAnywhere \u003e 12 Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.digitalbullets.org/?p=3" }, { "name": "1261", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1261" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 12.5 obfuscates the passwords in a GUI textbox with asterisks but does not encrypt them in the associated .cif (aka caller or CallerID) file, which allows local users to obtain the passwords from the window using tools such as Nirsoft Asterwin." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20060718 PcAnywhere \u003e 12 Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.digitalbullets.org/?p=3" }, { "name": "1261", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1261" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3785", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec pcAnywhere 12.5 obfuscates the passwords in a GUI textbox with asterisks but does not encrypt them in the associated .cif (aka caller or CallerID) file, which allows local users to obtain the passwords from the window using tools such as Nirsoft Asterwin." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060718 PcAnywhere \u003e 12 Local Privilege Escalation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "name": "http://www.digitalbullets.org/?p=3", "refsource": "MISC", "url": "http://www.digitalbullets.org/?p=3" }, { "name": "1261", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1261" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3785", "datePublished": "2006-07-21T21:00:00", "dateReserved": "2006-07-21T00:00:00", "dateUpdated": "2024-08-07T18:39:54.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3479
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120124_00 | x_refsource_CONFIRM | |
http://secunia.com/advisories/48092 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/51593 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:37:47.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "name": "48092", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48092" }, { "name": "51593", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51593" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), uses world-writable permissions for product-installation files, which allows local users to gain privileges by modifying a file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-05T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "name": "48092", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48092" }, { "name": "51593", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51593" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3479", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), uses world-writable permissions for product-installation files, which allows local users to gain privileges by modifying a file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "name": "48092", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48092" }, { "name": "51593", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51593" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3479", "datePublished": "2012-01-25T15:00:00", "dateReserved": "2011-09-14T00:00:00", "dateUpdated": "2024-08-06T23:37:47.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0300
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1093 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000406030958.23902.qmail%40securityfocus.com | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:21.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1093", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1093" }, { "name": "20000405 PcAnywhere weak password encryption", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000406030958.23902.qmail%40securityfocus.com" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1093", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1093" }, { "name": "20000405 PcAnywhere weak password encryption", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000406030958.23902.qmail%40securityfocus.com" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0300", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1093", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1093" }, { "name": "20000405 PcAnywhere weak password encryption", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000406030958.23902.qmail@securityfocus.com" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0300", "datePublished": "2000-04-26T04:00:00", "dateReserved": "2000-04-26T00:00:00", "dateUpdated": "2024-08-08T05:14:21.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1028
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/288 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=ntbugtraq&m=92807524225090&w=2 | mailing-list, x_refsource_NTBUGTRAQ | |
http://www.iss.net/security_center/static/2256.php | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:55:29.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "288", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/288" }, { "name": "19990528 DoS against PC Anywhere", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=ntbugtraq\u0026m=92807524225090\u0026w=2" }, { "name": "pcanywhere-dos(2256)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/2256.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1999-05-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 8.0 allows remote attackers to cause a denial of service (CPU utilization) via a large amount of data to port 5631." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-17T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "288", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/288" }, { "name": "19990528 DoS against PC Anywhere", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ" ], "url": "http://marc.info/?l=ntbugtraq\u0026m=92807524225090\u0026w=2" }, { "name": "pcanywhere-dos(2256)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/2256.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1028", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec pcAnywhere 8.0 allows remote attackers to cause a denial of service (CPU utilization) via a large amount of data to port 5631." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "288", "refsource": "BID", "url": "http://www.securityfocus.com/bid/288" }, { "name": "19990528 DoS against PC Anywhere", "refsource": "NTBUGTRAQ", "url": "http://marc.info/?l=ntbugtraq\u0026m=92807524225090\u0026w=2" }, { "name": "pcanywhere-dos(2256)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/2256.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1028", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T16:55:29.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0291
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120124_00 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/51965 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/48092 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:30.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "name": "51965", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51965" }, { "name": "48092", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48092" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) allow remote attackers to cause a denial of service (application crash or hang) via (1) malformed data from a client, (2) malformed data from a server, or (3) an invalid response." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-05T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "name": "51965", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51965" }, { "name": "48092", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48092" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0291", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) allow remote attackers to cause a denial of service (application crash or hang) via (1) malformed data from a client, (2) malformed data from a server, or (3) an invalid response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "name": "51965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51965" }, { "name": "48092", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48092" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0291", "datePublished": "2012-02-22T11:00:00", "dateReserved": "2012-01-04T00:00:00", "dateUpdated": "2024-08-06T18:23:30.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0324
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1150 | vdb-entry, x_refsource_BID | |
http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.osvdb.org/1301 | vdb-entry, x_refsource_OSVDB | |
http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.iss.net/security_center/static/4347.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.1000425150157.13567A-100000%40sword.damocles.com | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:21.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1150", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1150" }, { "name": "20010212 Re: Symantec pcAnywhere 9.0 DoS / Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html" }, { "name": "1301", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/1301" }, { "name": "20010211 Symantec pcAnywhere 9.0 DoS / Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html" }, { "name": "pcanywhere-tcpsyn-dos(4347)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/4347.php" }, { "name": "20000425 Denial of Service Against pcAnywhere.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.3.96.1000425150157.13567A-100000%40sword.damocles.com" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "pcAnywhere 8.x and 9.0 allows remote attackers to cause a denial of service via a TCP SYN scan, e.g. by nmap." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1150", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1150" }, { "name": "20010212 Re: Symantec pcAnywhere 9.0 DoS / Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html" }, { "name": "1301", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/1301" }, { "name": "20010211 Symantec pcAnywhere 9.0 DoS / Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html" }, { "name": "pcanywhere-tcpsyn-dos(4347)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/4347.php" }, { "name": "20000425 Denial of Service Against pcAnywhere.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.3.96.1000425150157.13567A-100000%40sword.damocles.com" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0324", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "pcAnywhere 8.x and 9.0 allows remote attackers to cause a denial of service via a TCP SYN scan, e.g. by nmap." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1150", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1150" }, { "name": "20010212 Re: Symantec pcAnywhere 9.0 DoS / Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html" }, { "name": "1301", "refsource": "OSVDB", "url": "http://www.osvdb.org/1301" }, { "name": "20010211 Symantec pcAnywhere 9.0 DoS / Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html" }, { "name": "pcanywhere-tcpsyn-dos(4347)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/4347.php" }, { "name": "20000425 Denial of Service Against pcAnywhere.", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.3.96.1000425150157.13567A-100000@sword.damocles.com" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0324", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2000-05-11T00:00:00", "dateUpdated": "2024-08-08T05:14:21.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0290
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/51862 | vdb-entry, x_refsource_BID | |
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120124_00 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72996 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/48092 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:29.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "51862", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51862" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "name": "pcanywhere-unauth-access(72996)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72996" }, { "name": "48092", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48092" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) do not properly handle the client state after abnormal termination of a remote session, which allows remote attackers to obtain access to the client by leveraging an \"open client session.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-05T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "51862", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51862" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "name": "pcanywhere-unauth-access(72996)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72996" }, { "name": "48092", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48092" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0290", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) do not properly handle the client state after abnormal termination of a remote session, which allows remote attackers to obtain access to the client by leveraging an \"open client session.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "51862", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51862" }, { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "name": "pcanywhere-unauth-access(72996)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72996" }, { "name": "48092", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48092" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0290", "datePublished": "2012-02-06T20:00:00", "dateReserved": "2012-01-04T00:00:00", "dateUpdated": "2024-08-06T18:23:29.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-1970
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/15673 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/13933 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1014178 | vdb-entry, x_refsource_SECTRACK | |
http://securityresponse.symantec.com/avcenter/security/Content/2005.06.10.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:06:57.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15673", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15673" }, { "name": "13933", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13933" }, { "name": "1014178", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014178" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.06.10.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 10.5x and 11.x before 11.5, with \"Launch with Windows\" enabled, allows local users with physical access to execute arbitrary commands via the Caller Properties feature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-01-12T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15673", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15673" }, { "name": "13933", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13933" }, { "name": "1014178", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014178" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.06.10.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1970", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec pcAnywhere 10.5x and 11.x before 11.5, with \"Launch with Windows\" enabled, allows local users with physical access to execute arbitrary commands via the Caller Properties feature." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15673", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15673" }, { "name": "13933", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13933" }, { "name": "1014178", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014178" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.06.10.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.06.10.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1970", "datePublished": "2005-06-14T04:00:00", "dateReserved": "2005-06-14T00:00:00", "dateUpdated": "2024-08-07T22:06:57.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4855
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:23:41.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1016892", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016892" }, { "name": "21938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21938" }, { "name": "1016893", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016893" }, { "name": "1016895", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016895" }, { "name": "1016889", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016889" }, { "name": "20060915 Symantec Norton Insufficient validation of \u0027SymEvent\u0027 driver input buffer", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "name": "1016897", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016897" }, { "name": "1591", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1591" }, { "name": "1016896", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016896" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php" }, { "name": "20051", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html" }, { "name": "ADV-2006-3636", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "name": "symantec-firewall-symevent-dos(28960)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" }, { "name": "1016894", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016894" }, { "name": "1016898", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016898" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The \\Device\\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1016892", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016892" }, { "name": "21938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21938" }, { "name": "1016893", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016893" }, { "name": "1016895", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016895" }, { "name": "1016889", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016889" }, { "name": "20060915 Symantec Norton Insufficient validation of \u0027SymEvent\u0027 driver input buffer", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "name": "1016897", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016897" }, { "name": "1591", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1591" }, { "name": "1016896", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016896" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php" }, { "name": "20051", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html" }, { "name": "ADV-2006-3636", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "name": "symantec-firewall-symevent-dos(28960)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" }, { "name": "1016894", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016894" }, { "name": "1016898", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016898" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4855", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The \\Device\\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1016892", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016892" }, { "name": "21938", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21938" }, { "name": "1016893", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016893" }, { "name": "1016895", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016895" }, { "name": "1016889", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016889" }, { "name": "20060915 Symantec Norton Insufficient validation of \u0027SymEvent\u0027 driver input buffer", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "name": "1016897", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016897" }, { "name": "1591", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1591" }, { "name": "1016896", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016896" }, { "name": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php" }, { "name": "20051", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20051" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html" }, { "name": "ADV-2006-3636", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "name": "symantec-firewall-symevent-dos(28960)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" }, { "name": "1016894", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016894" }, { "name": "1016898", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016898" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4855", "datePublished": "2006-09-19T18:00:00", "dateReserved": "2006-09-19T00:00:00", "dateUpdated": "2024-08-07T19:23:41.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0273
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/1095 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:20.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20000409 A funny way to DOS pcANYWHERE8.0 and 9.0", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html" }, { "name": "1095", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1095" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-04-10T00:00:00", "descriptions": [ { "lang": "en", "value": "PCAnywhere allows remote attackers to cause a denial of service by terminating the connection before PCAnywhere provides a login prompt." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20000409 A funny way to DOS pcANYWHERE8.0 and 9.0", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html" }, { "name": "1095", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1095" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0273", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PCAnywhere allows remote attackers to cause a denial of service by terminating the connection before PCAnywhere provides a login prompt." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20000409 A funny way to DOS pcANYWHERE8.0 and 9.0", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html" }, { "name": "1095", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1095" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0273", "datePublished": "2000-10-13T04:00:00", "dateReserved": "2000-04-26T00:00:00", "dateUpdated": "2024-08-08T05:14:20.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-0538
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securityresponse.symantec.com/avcenter/security/Content/2009.03.17.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/33845 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/34305 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1021855 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49291 | vdb-entry, x_refsource_XF | |
http://osvdb.org/52797 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2009/0755 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/501930/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.layereddefense.com/pcanywhere17mar.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:40:05.050Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2009.03.17.html" }, { "name": "33845", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33845" }, { "name": "34305", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34305" }, { "name": "1021855", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021855" }, { "name": "symantec-pcanywhere-unspecified-dos(49291)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49291" }, { "name": "52797", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/52797" }, { "name": "ADV-2009-0755", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0755" }, { "name": "20090318 Layered Defense Research Advisory: Format String Vulnerablity in Symantec PcAnywhere v10-12.5", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/501930/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.layereddefense.com/pcanywhere17mar.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in Symantec pcAnywhere before 12.5 SP1 allows local users to read and modify arbitrary memory locations, and cause a denial of service (application crash) or possibly have unspecified other impact, via format string specifiers in the pathname of a remote control file (aka .CHF file)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2009.03.17.html" }, { "name": "33845", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33845" }, { "name": "34305", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34305" }, { "name": "1021855", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021855" }, { "name": "symantec-pcanywhere-unspecified-dos(49291)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49291" }, { "name": "52797", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/52797" }, { "name": "ADV-2009-0755", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0755" }, { "name": "20090318 Layered Defense Research Advisory: Format String Vulnerablity in Symantec PcAnywhere v10-12.5", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/501930/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.layereddefense.com/pcanywhere17mar.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0538", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in Symantec pcAnywhere before 12.5 SP1 allows local users to read and modify arbitrary memory locations, and cause a denial of service (application crash) or possibly have unspecified other impact, via format string specifiers in the pathname of a remote control file (aka .CHF file)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2009.03.17.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2009.03.17.html" }, { "name": "33845", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33845" }, { "name": "34305", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34305" }, { "name": "1021855", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021855" }, { "name": "symantec-pcanywhere-unspecified-dos(49291)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49291" }, { "name": "52797", "refsource": "OSVDB", "url": "http://osvdb.org/52797" }, { "name": "ADV-2009-0755", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0755" }, { "name": "20090318 Layered Defense Research Advisory: Format String Vulnerablity in Symantec PcAnywhere v10-12.5", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/501930/100/0/threaded" }, { "name": "http://www.layereddefense.com/pcanywhere17mar.html", "refsource": "MISC", "url": "http://www.layereddefense.com/pcanywhere17mar.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0538", "datePublished": "2009-03-18T15:00:00", "dateReserved": "2009-02-12T00:00:00", "dateUpdated": "2024-08-07T04:40:05.050Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2619
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/34203 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/1753 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/41982 | vdb-entry, x_refsource_OSVDB | |
http://securityresponse.symantec.com/avcenter/security/Content/2007.05.09b.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1018032 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/23875 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:42:33.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "pcanywhere-memory-information-disclosure(34203)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34203" }, { "name": "ADV-2007-1753", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1753" }, { "name": "41982", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41982" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.05.09b.html" }, { "name": "1018032", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018032" }, { "name": "23875", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23875" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 11.5.x and 12.0.x retains unencrypted login credentials for the most recent login within process memory, which allows local administrators to obtain the credentials by reading process memory, a different vulnerability than CVE-2006-3785." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "pcanywhere-memory-information-disclosure(34203)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34203" }, { "name": "ADV-2007-1753", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1753" }, { "name": "41982", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41982" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.05.09b.html" }, { "name": "1018032", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018032" }, { "name": "23875", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23875" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2619", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec pcAnywhere 11.5.x and 12.0.x retains unencrypted login credentials for the most recent login within process memory, which allows local administrators to obtain the credentials by reading process memory, a different vulnerability than CVE-2006-3785." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "pcanywhere-memory-information-disclosure(34203)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34203" }, { "name": "ADV-2007-1753", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1753" }, { "name": "41982", "refsource": "OSVDB", "url": "http://osvdb.org/41982" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2007.05.09b.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.05.09b.html" }, { "name": "1018032", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018032" }, { "name": "23875", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23875" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2619", "datePublished": "2007-05-11T16:00:00", "dateReserved": "2007-05-11T00:00:00", "dateUpdated": "2024-08-07T13:42:33.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3478
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://osvdb.org/show/osvdb/78532 | vdb-entry, x_refsource_OSVDB | |
https://www.exploit-db.com/exploits/38599/ | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/51592 | vdb-entry, x_refsource_BID | |
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120124_00 | x_refsource_CONFIRM | |
http://www.zerodayinitiative.com/advisories/ZDI-12-018/ | x_refsource_CONFIRM | |
http://secunia.com/advisories/48092 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:37:47.739Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "78532", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/show/osvdb/78532" }, { "name": "38599", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/38599/" }, { "name": "51592", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51592" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-12-018/" }, { "name": "48092", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48092" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The host-services component in Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), does not properly filter login and authentication data, which allows remote attackers to execute arbitrary code via a crafted session on TCP port 5631." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-05T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "78532", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/show/osvdb/78532" }, { "name": "38599", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/38599/" }, { "name": "51592", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51592" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-12-018/" }, { "name": "48092", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48092" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3478", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The host-services component in Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), does not properly filter login and authentication data, which allows remote attackers to execute arbitrary code via a crafted session on TCP port 5631." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "78532", "refsource": "OSVDB", "url": "http://osvdb.org/show/osvdb/78532" }, { "name": "38599", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/38599/" }, { "name": "51592", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51592" }, { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-12-018/", "refsource": "CONFIRM", "url": "http://www.zerodayinitiative.com/advisories/ZDI-12-018/" }, { "name": "48092", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48092" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3478", "datePublished": "2012-01-25T15:00:00", "dateReserved": "2011-09-14T00:00:00", "dateUpdated": "2024-08-06T23:37:47.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-3784
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/21113 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2006/2874 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/440448/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.digitalbullets.org/?p=3 | x_refsource_MISC | |
http://securityreason.com/securityalert/1261 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:39:54.089Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21113", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21113" }, { "name": "ADV-2006-2874", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2874" }, { "name": "20060718 PcAnywhere \u003e 12 Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.digitalbullets.org/?p=3" }, { "name": "1261", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1261" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 12.5 uses weak default permissions for the \"Symantec\\pcAnywhere\\Hosts\" folder, which allows local users to gain privileges by inserting a superuser .cif (aka caller or CallerID) file into the folder, and then using a pcAnywhere client to login as a local administrator." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21113", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21113" }, { "name": "ADV-2006-2874", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2874" }, { "name": "20060718 PcAnywhere \u003e 12 Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.digitalbullets.org/?p=3" }, { "name": "1261", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1261" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3784", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec pcAnywhere 12.5 uses weak default permissions for the \"Symantec\\pcAnywhere\\Hosts\" folder, which allows local users to gain privileges by inserting a superuser .cif (aka caller or CallerID) file into the folder, and then using a pcAnywhere client to login as a local administrator." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21113", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21113" }, { "name": "ADV-2006-2874", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2874" }, { "name": "20060718 PcAnywhere \u003e 12 Local Privilege Escalation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "name": "http://www.digitalbullets.org/?p=3", "refsource": "MISC", "url": "http://www.digitalbullets.org/?p=3" }, { "name": "1261", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1261" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3784", "datePublished": "2006-07-21T21:00:00", "dateReserved": "2006-07-21T00:00:00", "dateUpdated": "2024-08-07T18:39:54.089Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0292
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/52094 | vdb-entry, x_refsource_BID | |
http://www.exploit-db.com/exploits/18493/ | exploit, x_refsource_EXPLOIT-DB | |
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120301_00 | x_refsource_CONFIRM | |
http://secunia.com/advisories/48092 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:29.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52094", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52094" }, { "name": "18493", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18493/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120301_00" }, { "name": "48092", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48092" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The awhost32 service in Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) allows remote attackers to cause a denial of service (daemon crash) via a crafted TCP session on port 5631." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-05T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "52094", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52094" }, { "name": "18493", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18493/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120301_00" }, { "name": "48092", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48092" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0292", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The awhost32 service in Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) allows remote attackers to cause a denial of service (daemon crash) via a crafted TCP session on port 5631." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "52094", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52094" }, { "name": "18493", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18493/" }, { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120301_00", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120301_00" }, { "name": "48092", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48092" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0292", "datePublished": "2012-03-08T02:00:00", "dateReserved": "2012-01-04T00:00:00", "dateUpdated": "2024-08-06T18:23:29.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB0C7336-52DC-4E0D-9F6F-9B401B0A93EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts." } ], "id": "CVE-2000-0300", "lastModified": "2024-11-20T23:32:11.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-04-06T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1093" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000406030958.23902.qmail%40securityfocus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000406030958.23902.qmail%40securityfocus.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 12.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "067CAB0F-D513-4A70-B6C6-06EE290A2F6F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 12.5 obfuscates the passwords in a GUI textbox with asterisks but does not encrypt them in the associated .cif (aka caller or CallerID) file, which allows local users to obtain the passwords from the window using tools such as Nirsoft Asterwin." }, { "lang": "es", "value": "Symantec pcAnywhere 12.5 ofusca la contrase\u00f1a en un cuadro de texto del GUI con asteriscos, pero no la encripta en el fichero .cif asociado (tambi\u00e9n conocido como caller o CallerID), lo que permite a usuarios locales obtener la contrase\u00f1a de la ventana utilizando herramientas como el Nirsoft Asterwin." } ], "id": "CVE-2006-3785", "lastModified": "2024-11-21T00:14:25.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-24T12:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1261" }, { "source": "cve@mitre.org", "url": "http://www.digitalbullets.org/?p=3" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.digitalbullets.org/?p=3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 10.0 | |
symantec | pcanywhere | 10.5 | |
symantec | pcanywhere | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DAB70F5-1B1B-426B-A1F9-6D91D0A160B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F0A6A97-1EFF-41C0-AAAA-B357C4C801F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "014AA70B-942F-4ADE-9EEF-4F5204438268", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec PCAnywhere 10.x and 11, when started as a service, allows attackers to gain SYSTEM privileges via the help interface using AWHOST32.exe." }, { "lang": "es", "value": "Symantec PCAnywhere 10.x y 11, cuando se arranca como un servicio, permite a atacantes remotos ganar privielgios de Sistema mediante el interfaz de ayuda usando AWHOST32.exe." } ], "id": "CVE-2003-0936", "lastModified": "2024-11-20T23:45:49.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-15T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=106875764826251\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=106876107330752\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2003.11.13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=106875764826251\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=106876107330752\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2003.11.13.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 12.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "067CAB0F-D513-4A70-B6C6-06EE290A2F6F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 12.5 uses weak integrity protection for .cif (aka caller or CallerID) files, which allows local users to generate a custom .cif file and modify the superuser flag." }, { "lang": "es", "value": "Symantec pcAnywhere 12.5 utiliza protecci\u00f3n de integridad d\u00e9bil para los ficheros .cif (tambi\u00e9n conocido como caller o CallerID), lo cual permite a usuarios locales generar un fichero .cif personalizado y modificar la bandera de super-usuario." } ], "id": "CVE-2006-3786", "lastModified": "2024-11-21T00:14:25.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-24T12:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1261" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016534" }, { "source": "cve@mitre.org", "url": "http://www.digitalbullets.org/?p=3" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.digitalbullets.org/?p=3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | * | |
symantec | pcanywhere | 10.0 | |
symantec | pcanywhere | 10.5 | |
symantec | pcanywhere | 11.0 | |
symantec | pcanywhere | 11.0.1 | |
symantec | pcanywhere | 11.5 | |
symantec | pcanywhere | 11.5.1 | |
symantec | pcanywhere | 12.0 | |
symantec | pcanywhere | 12.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B5D2349-8330-4DE8-8040-6FDD368EFD32", "versionEndIncluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DAB70F5-1B1B-426B-A1F9-6D91D0A160B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F0A6A97-1EFF-41C0-AAAA-B357C4C801F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "014AA70B-942F-4ADE-9EEF-4F5204438268", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D0BF0A19-0AAD-44B2-9B51-85A985CC40A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "A496D973-4BC8-4377-8C84-8F2CB281AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF752E6-45B4-4D6D-90F8-AA69DB5C2775", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13E1710-1723-4A52-ACDC-7FC511467152", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECE0E3DD-23F9-4ACD-BF9D-986CE5232D4E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in Symantec pcAnywhere before 12.5 SP1 allows local users to read and modify arbitrary memory locations, and cause a denial of service (application crash) or possibly have unspecified other impact, via format string specifiers in the pathname of a remote control file (aka .CHF file)." }, { "lang": "es", "value": "Una vulnerabilidad de formato de cadena en Symantec pcAnywhere antes de 12.5 SP1 permite a atacantes remotos leer y modificar localizaciones de memoria de su elecci\u00f3n y producir una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) o posiblemente tener otro efecto no especificado mediante especificadores de cadena de formato en el nombre de ruta de fichero de un fichero de control remoto (alias fichero .CHF)." } ], "id": "CVE-2009-0538", "lastModified": "2024-11-21T01:00:16.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-18T15:30:00.453", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/52797" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34305" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2009.03.17.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1021855" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.layereddefense.com/pcanywhere17mar.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/501930/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33845" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0755" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/52797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2009.03.17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.layereddefense.com/pcanywhere17mar.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/501930/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0755" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49291" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 8.0.1 | |
symantec | pcanywhere | 8.0.2 | |
symantec | pcanywhere | 9.0 | |
symantec | pcanywhere | 9.0.1 | |
symantec | pcanywhere | 9.2 | |
symantec | pcanywhere | 10.0 | |
symantec | pcanywhere | 10.5 | |
symantec | pcanywhere | 11.0 | |
symantec | pcanywhere | 11.0.1 | |
symantec | pcanywhere | 11.5 | |
symantec | pcanywhere | 11.5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B543CCFB-954B-4CCF-8BB7-E64DAFA0C1F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "09E5DA00-5FDC-42DE-955B-E977E62A2B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB0C7336-52DC-4E0D-9F6F-9B401B0A93EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F96BE1D8-29D3-41F1-9CE9-66D5D8013C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "DFDF9CE6-93A7-49EC-B6B5-428C7517E902", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DAB70F5-1B1B-426B-A1F9-6D91D0A160B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F0A6A97-1EFF-41C0-AAAA-B357C4C801F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "014AA70B-942F-4ADE-9EEF-4F5204438268", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D0BF0A19-0AAD-44B2-9B51-85A985CC40A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "A496D973-4BC8-4377-8C84-8F2CB281AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF752E6-45B4-4D6D-90F8-AA69DB5C2775", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Symantec pcAnywhere 11.0.1, 11.5.1, and all other 32-bit versions allows remote attackers to cause a denial of service (application crash) via unknown attack vectors." } ], "id": "CVE-2005-3934", "lastModified": "2024-11-21T00:03:05.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-01T06:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17797" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015284" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/15646" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.symantec.com/avcenter/security/Content/2005.11.29.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2658" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/15646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.symantec.com/avcenter/security/Content/2005.11.29.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23298" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | * | |
symantec | pcanywhere | 10.0 | |
symantec | pcanywhere | 10.5 | |
symantec | pcanywhere | 11.0 | |
symantec | pcanywhere | 11.0.1 | |
symantec | pcanywhere | 11.5 | |
symantec | pcanywhere | 11.5.1 | |
symantec | pcanywhere | 12.0 | |
symantec | pcanywhere | 12.0.1 | |
symantec | pcanywhere | 12.0.2 | |
symantec | pcanywhere | 12.0.3 | |
symantec | pcanywhere | 12.1 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5.3 | |
symantec | pcanywhere | 12.5.265 | |
symantec | pcanywhere | 12.5.539 | |
symantec | altiris_client_management_suite_pcanywhere_solution | 7.0 | |
symantec | altiris_deployment_solution_remote_pcanywhere_solution | 7.1 | |
symantec | altiris_it_management_suite_pcanywhere_solution | 7.0 | |
symantec | altiris_it_management_suite_pcanywhere_solution | 7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "439DFE25-7834-4E70-AB3A-47CC76528281", "versionEndIncluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DAB70F5-1B1B-426B-A1F9-6D91D0A160B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F0A6A97-1EFF-41C0-AAAA-B357C4C801F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "014AA70B-942F-4ADE-9EEF-4F5204438268", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D0BF0A19-0AAD-44B2-9B51-85A985CC40A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "A496D973-4BC8-4377-8C84-8F2CB281AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF752E6-45B4-4D6D-90F8-AA69DB5C2775", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13E1710-1723-4A52-ACDC-7FC511467152", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "87DBE939-A827-4B90-A618-AA5A044D74E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D33DDEF5-032D-4AC2-BBCD-6E3D1E06BA1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "16E976A6-625C-4B20-B1F1-429A6902BEF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECE0E3DD-23F9-4ACD-BF9D-986CE5232D4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "067CAB0F-D513-4A70-B6C6-06EE290A2F6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "39F3C225-B890-47BB-9898-0EFEC969B74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "A4C296DE-5385-4C59-8824-B1695D38C332", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E3CA1694-B60F-418A-981D-2393BD74E288", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5.265:*:*:*:*:*:*:*", "matchCriteriaId": "EE75BA8C-3E29-45CC-BD06-E504513A55AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5.539:*:*:*:*:*:*:*", "matchCriteriaId": "A9C845AC-3C09-4676-964F-644A01D133CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_client_management_suite_pcanywhere_solution:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "068FE96E-DEB9-4AEA-8A5B-9152B75E0C7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution_remote_pcanywhere_solution:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5503E846-7BB7-4B05-B234-609167B443C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_it_management_suite_pcanywhere_solution:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2E8464B-ACB2-4DB7-A0CF-EBF5FC5997A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_it_management_suite_pcanywhere_solution:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D9A6CB3-92E5-40CA-9E00-5C05F478C56C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) allow remote attackers to cause a denial of service (application crash or hang) via (1) malformed data from a client, (2) malformed data from a server, or (3) an invalid response." }, { "lang": "es", "value": "Symantec pcAnywhere hasta la v12.5.3, Altiris IT Management Suite pcAnywhere Solution v7.0 (tambi\u00e9n conocido como v12.5.x) y v7.1 (\u00f3 v12.6.x), Altiris Altiris Client Management Suite pcAnywhere Solution v7.0 (tambi\u00e9n conocido como v12.5.x) y v7.1 (\u00f3 v12.6.x) y Altiris Deployment Solution Remote pcAnywhere Solution v7.1 (tambi\u00e9n conocido como v12.5.x y v12.6.x) permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda o bloqueo de la aplicaci\u00f3n) a trav\u00e9s de (1) datos con formato incorrecto de un cliente, (2) de datos con formato incorrecto de un servidor, o (3) una respuesta no v\u00e1lida." } ], "id": "CVE-2012-0291", "lastModified": "2024-11-21T01:34:43.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-22T13:54:02.193", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/48092" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/51965" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "447EE4D0-ED48-490E-BC1C-831A165CFF29", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 8.0 allows remote attackers to cause a denial of service (CPU utilization) via a large amount of data to port 5631." } ], "id": "CVE-1999-1028", "lastModified": "2024-11-20T23:30:06.613", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-05-28T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=ntbugtraq\u0026m=92807524225090\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/2256.php" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=ntbugtraq\u0026m=92807524225090\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/2256.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/288" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5.539 | |
symantec | pcanywhere | 12.6.65 | |
symantec | pcanywhere | 12.6.65 | |
symantec | pcanywhere | 12.6.7580 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "067CAB0F-D513-4A70-B6C6-06EE290A2F6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "39F3C225-B890-47BB-9898-0EFEC969B74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "A4C296DE-5385-4C59-8824-B1695D38C332", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp3:*:*:*:*:*:*", "matchCriteriaId": "F1C797C5-7F76-4ECE-859C-B928F380A08D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5.539:*:*:*:*:*:*:*", "matchCriteriaId": "A9C845AC-3C09-4676-964F-644A01D133CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.6.65:*:*:*:*:*:*:*", "matchCriteriaId": "D0D0B814-A9C3-4D47-B1C5-59DE0CFEDCF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.6.65:sp1:*:*:*:*:*:*", "matchCriteriaId": "D2415480-FC3C-45BF-B93C-F76F0C011F97", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.6.7580:*:*:*:*:*:*:*", "matchCriteriaId": "92218E59-B767-498A-8F09-20202AE643E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), uses world-writable permissions for product-installation files, which allows local users to gain privileges by modifying a file." }, { "lang": "es", "value": "Symantec pcAnywhere v12.5.x a trav\u00e9s de c12.5.3, y IT Management Suite pcAnywhere soluci\u00f3n c7.0 (aka 12.5.x) y c7.1 (tambi\u00e9n conocido como 12.6.x), utiliza el mundo pueda escribir permisos para los archivos de instalaci\u00f3n del producto, que permite a usuarios locales conseguir privilegios mediante la modificaci\u00f3n de un archivo." } ], "id": "CVE-2011-3479", "lastModified": "2024-11-21T01:30:33.593", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-25T15:55:01.050", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/48092" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/51593" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 11.5 | |
symantec | pcanywhere | 11.5.1 | |
symantec | pcanywhere | 12.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "A496D973-4BC8-4377-8C84-8F2CB281AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF752E6-45B4-4D6D-90F8-AA69DB5C2775", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13E1710-1723-4A52-ACDC-7FC511467152", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 11.5.x and 12.0.x retains unencrypted login credentials for the most recent login within process memory, which allows local administrators to obtain the credentials by reading process memory, a different vulnerability than CVE-2006-3785." }, { "lang": "es", "value": "Symantec pcAnywhere 11.5.x y 12.0.x retiene credenciales de autenticaci\u00f3n no cifradas para la \u00faltima autenticaci\u00f3n en la memoria del proceso, lo cual permite a administradores locales obtener las credenciales al leer la memoria del proceso, vulnerabilidad diferente de CVE-2006-3785." } ], "id": "CVE-2007-2619", "lastModified": "2024-11-21T00:31:14.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-11T16:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/41982" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.05.09b.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1018032" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/23875" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1753" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/41982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.05.09b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1018032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/23875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34203" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 12.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "067CAB0F-D513-4A70-B6C6-06EE290A2F6F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 12.5 uses weak default permissions for the \"Symantec\\pcAnywhere\\Hosts\" folder, which allows local users to gain privileges by inserting a superuser .cif (aka caller or CallerID) file into the folder, and then using a pcAnywhere client to login as a local administrator." }, { "lang": "es", "value": "Symantec pcAnywhere 12.5 utiliza unos permisos por defecto d\u00e9biles para la carpeta \"Symantec\\pcAnywhere\\Hosts\", lo cual permite a un usuario local ganar privilegios a trav\u00e9s de la insercci\u00f3n de un superusuario archivo .cif (tambi\u00e9n conocido como llamador o CallerID) dentro de la carpeta, y por lo tanto utilizando un cliente pcAnywhere entrar como administrador local." } ], "id": "CVE-2006-3784", "lastModified": "2024-11-21T00:14:25.067", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-24T12:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21113" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1261" }, { "source": "cve@mitre.org", "url": "http://www.digitalbullets.org/?p=3" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/2874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.digitalbullets.org/?p=3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/440448/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2874" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html | Exploit, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/1095 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/1095 | Exploit, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 8.0 | |
symantec | pcanywhere | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "447EE4D0-ED48-490E-BC1C-831A165CFF29", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB0C7336-52DC-4E0D-9F6F-9B401B0A93EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PCAnywhere allows remote attackers to cause a denial of service by terminating the connection before PCAnywhere provides a login prompt." } ], "id": "CVE-2000-0273", "lastModified": "2024-11-20T23:32:07.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-04-09T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1095" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:client_security:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1DFD4CB-40A1-4D70-97AC-0941826F28CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.0_b8.01.9378:*:*:*:*:*:*:*", "matchCriteriaId": "9A56518F-41E9-455D-9AC1-98FFDCE295C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5C856CC4-0AAE-4539-A57B-0160AA5751F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.425a:mr1:*:*:*:*:*:*", "matchCriteriaId": "9EE482AD-A0F8-4634-A3FE-08F112647648", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.429c:mr2:*:*:*:*:*:*", "matchCriteriaId": "B3FC66EB-2267-4B42-BD99-C4344DAE1C75", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.434:mr3:*:*:*:*:*:*", "matchCriteriaId": "BE15AE1D-8647-444F-90F0-FC658A3AC344", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.437:*:*:*:*:*:*:*", "matchCriteriaId": "0C03FA86-F2E6-4E41-8368-E917C91D7837", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.446:mr4:*:*:*:*:*:*", "matchCriteriaId": "95BF74F0-40F1-4395-AC85-E6B566950C53", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.457:mr5:*:*:*:*:*:*", "matchCriteriaId": "994CB184-AFE8-4673-ACE8-085813F1E71F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.460:mr6:*:*:*:*:*:*", "matchCriteriaId": "85CF6FFB-4189-4558-A70D-DE6D4C0C1F82", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.464:mr7:*:*:*:*:*:*", "matchCriteriaId": "31D6A148-A92C-4FCA-8762-16764D62C363", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.471:mr8:*:*:*:*:*:*", "matchCriteriaId": "3E6E2EA2-88DA-4DF0-9AA3-3E3D2C80C04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.501:mr9:*:*:*:*:*:*", "matchCriteriaId": "AC1B69D3-8A9C-481E-8891-1ACD8479CBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0_build_8.01.9374:*:*:*:*:*:*:*", "matchCriteriaId": "70D72649-92F9-4820-B5A5-A14B52714809", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7483F6DD-EDC0-497E-A5A9-B186E02CCCEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2DA2590E-DFB0-4B72-99BC-B49AD97A4969", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_build_393:*:*:*:*:*:*:*", "matchCriteriaId": "766C850E-817E-41AB-B0FF-413513548BC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr1_build_8.1.1.314a:*:*:*:*:*:*:*", "matchCriteriaId": "FB47C16B-5221-4D64-BDB2-65D072A66C02", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr2_build_8.1.1.319:*:*:*:*:*:*:*", "matchCriteriaId": "204F2046-F116-45D7-9256-179A3B59886A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr3_build_8.1.1.323:*:*:*:*:*:*:*", "matchCriteriaId": "CD0C67C0-3CF1-4BAD-A673-9B783E1D0724", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr4_build_8.1.1.329:*:*:*:*:*:*:*", "matchCriteriaId": "274EA5DA-9519-46DE-B11E-87BDF1978E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr5_build_8.1.1.336:*:*:*:*:*:*:*", "matchCriteriaId": "044C020A-0BCC-4037-BC32-73385A0BE019", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr6_b8.1.1.266:*:*:*:*:*:*:*", "matchCriteriaId": "9A0176BE-3D55-422B-9FDD-961A00CFAC19", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1_stm_b8.1.0.825a:*:*:*:*:*:*:*", "matchCriteriaId": "CA3D7305-B8D0-4165-9F0F-50A49142EF2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.1_build_9.0.1.1000:mr1:*:*:*:*:*:*", "matchCriteriaId": "D934F853-C7E0-421E-9AF3-B7B49228722F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.2_build_9.0.2.1000:mr2:*:*:*:*:*:*", "matchCriteriaId": "D608AACF-A4BC-49CE-BE49-E8F3AEF31DC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.3_build_9.0.3.1000:mr3:*:*:*:*:*:*", "matchCriteriaId": "3238894A-3C25-4CC8-A319-8AA7246FEC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.5_build_1100:*:*:*:*:*:*:*", "matchCriteriaId": "69E9F1EE-CB23-42DE-8787-7F477D16329F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0_scf_7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2D813-C219-4FF3-9C3B-DBB855480492", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0_stm_build_9.0.0.338:*:*:*:*:*:*:*", "matchCriteriaId": "A5A00A25-A52F-4E9D-AAD0-194171C772FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:host_ids:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F05B889-88D3-41AF-A79D-3E2F689BA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2.1:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "A9415109-C554-40F6-851E-CC016951BDF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "595CDCD1-4E0B-49E4-B726-82FAA99EF70A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "DBBAD310-3E2E-4E83-A605-47540668827F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1.425a:*:corporate:*:*:*:*:*", "matchCriteriaId": "F4341136-7821-4638-9F36-93361327250E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1.425c:*:corporate:*:*:*:*:*", "matchCriteriaId": "497BC653-98D7-41C5-94BB-2634B9C5BF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1.501:*:corporate:*:*:*:*:*", "matchCriteriaId": "094EED2C-F8FA-418B-B110-E44D90B9BA33", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1.9374:*:corporate:*:*:*:*:*", "matchCriteriaId": "15AEADC9-00B9-43BA-AABB-ADB7627CF0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1.9378:*:corporate:*:*:*:*:*", "matchCriteriaId": "39D769B1-B1D6-4F5C-9C66-00055D4A6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "3AA02AEB-362B-4A09-92E3-D6D8BB4B6CB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.0.825a:*:corporate:*:*:*:*:*", "matchCriteriaId": "3A82AC27-8BE6-47F7-A6EC-F4C21373AA58", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "ECAA6170-5520-4AA9-8358-5F91FD10420E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.319:*:corporate:*:*:*:*:*", "matchCriteriaId": "E626F14C-FDE9-4C6A-8CE7-B99CD4FEE485", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.323:*:corporate:*:*:*:*:*", "matchCriteriaId": "EC4CFE5A-4D51-405D-B92E-37DE4E617ABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.329:*:corporate:*:*:*:*:*", "matchCriteriaId": "727A116A-D18C-4F3F-A6A8-2C6107FFB8C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.366:*:corporate:*:*:*:*:*", "matchCriteriaId": "EAE76215-2A7E-4D71-8757-AE10E4A9AE0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.377:*:corporate:*:*:*:*:*", "matchCriteriaId": "AF45DF9D-D7BE-41AD-A838-0AF9A264EBFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1_build8.1.1.314a:*:corporate:*:*:*:*:*", "matchCriteriaId": "4A6612F1-4CA8-427A-AED4-854F943BA3D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1_build393:*:corporate:*:*:*:*:*", "matchCriteriaId": "902A4011-83C5-4A3B-B443-C51EA855E8E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.434:*:corporate:*:*:*:*:*", "matchCriteriaId": "8BB225A0-7FB9-4AD2-8ED2-5CC1AEBAAB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.437:*:corporate:*:*:*:*:*", "matchCriteriaId": "9603C423-F24A-4607-B721-D02EDA94AE8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.446:*:corporate:*:*:*:*:*", "matchCriteriaId": "574AAAA6-8181-457B-84CE-5AEB1895E3B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.457:*:corporate:*:*:*:*:*", "matchCriteriaId": "DF957AD3-B6E5-4BD7-832F-33E734817B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.460:*:corporate:*:*:*:*:*", "matchCriteriaId": "14D862F4-BE5F-4E6B-9955-ACFB48A5D3B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.464:*:corporate:*:*:*:*:*", "matchCriteriaId": "768B7F5E-E4AD-420E-92FA-A58E1AE3D1BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.471:*:corporate:*:*:*:*:*", "matchCriteriaId": "C15B7FEA-E6A9-4DBE-B1A9-E17E91512A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "D9E85FD6-9E89-4497-854C-60A20639CE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate:*:*:*:*:*", "matchCriteriaId": "91F70069-D0F2-41D8-862F-2162CE12D49F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "EDF0DA40-1AC4-4610-AEAC-F431E23BAEAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "5696AC09-E8BB-4060-9A81-EA2B190B850A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "C18E6605-5F86-4957-AE16-80F59F40110E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*", "matchCriteriaId": "56D54011-9B09-4C63-8301-609C03E51099", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate:*:*:*:*:*", "matchCriteriaId": "9EF7F7F6-FC6B-4258-AE1D-3E4C19B365B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate:*:*:*:*:*", "matchCriteriaId": "A10DA055-1F24-4AFD-A688-58D1DB4FB64A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "CAC5389A-8B18-40C4-A3E0-E50B6AA724FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2000:*:corporate:*:*:*:*:*", "matchCriteriaId": "88090CD5-A324-4A41-A55E-9381FBC14B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2001:*:corporate:*:*:*:*:*", "matchCriteriaId": "78E79E4D-E93B-4C6C-92EE-1E33EE1AEB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2002:*:corporate:*:*:*:*:*", "matchCriteriaId": "F6E6EC72-9B83-4685-B48E-25E4211EC280", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate:*:*:*:*:*", "matchCriteriaId": "275187A5-FB3A-41C2-A6F4-F2DC9D88D0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2011:*:corporate:*:*:*:*:*", "matchCriteriaId": "A7F0C0E9-9665-452E-A382-04656F2009AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate:*:*:*:*:*", "matchCriteriaId": "6A220194-CCB1-41F6-9CB0-A79C2E5E36FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*", "matchCriteriaId": "4D3CBEF5-25C6-41E8-97A3-2AA43134E619", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "81AE594C-41ED-4FE8-839D-B604AE8DC901", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2003:*:*:*:*:*:*:*", "matchCriteriaId": "34B1D862-2CB4-4D50-9BBA-0507FEAA1924", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2003:*:professional:*:*:*:*:*", "matchCriteriaId": "7D43A376-4282-4A66-860D-50483438EC80", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "C2E302A4-72F8-478B-9FA2-2536902986B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "C988B309-F397-412A-8570-C3823C7FE7E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2003:*:*:*:*:*:*:*", "matchCriteriaId": "AEF97C5F-3A80-4973-85FD-5BCE43B32AD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2003:*:professional:*:*:*:*:*", "matchCriteriaId": "EF583EBF-0FDC-45FD-ADAE-C38D9DB34ED2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "09CA1AC8-E273-44C1-9D1C-19542EB57433", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:professional:*:*:*:*:*", "matchCriteriaId": "E4BBE123-56E1-46E0-93BE-38F0932D9C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:professional:*:*:*:*:*", "matchCriteriaId": "1DE91FB9-35C3-4DC7-BE00-7C60EE9FD880", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2007:*:*:*:*:*:*:*", "matchCriteriaId": "692ECBCD-AB6B-4965-93F4-BDAD4777C018", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2003:*:*:*:*:*:*:*", "matchCriteriaId": "74E5CAF7-C305-4FAF-8DA7-627D83F65185", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:*", "matchCriteriaId": "36C0FF0C-EB6E-479B-BFF9-E55CBC0D6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2005:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F3CB3-7EB3-416C-AD2F-6357DC7248CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2003_professional_edition:*:*:*:*:*:*:*", "matchCriteriaId": "79F3EAD1-C4DA-48E8-A582-A14F4401AD15", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004:*:*:*:*:*:*:*", "matchCriteriaId": "F589D9AA-FD1B-4929-93DC-801C36087E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004_professional_edition:*:*:*:*:*:*:*", "matchCriteriaId": "C37BF3DA-FD23-49A1-B97D-FD3B5896574D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005_premier:*:*:*:*:*:*:*", "matchCriteriaId": "B5E481D2-87F3-4912-BB87-5168C6A1BE23", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "A496D973-4BC8-4377-8C84-8F2CB281AEE1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The \\Device\\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data." }, { "lang": "es", "value": "El driver \\Device\\SymEvent en Symantec Norton Personal Firewall 2006 9.1.0.33, y otras versiones del Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, y 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0 y 10.1, Symantec pcAnywhere 11.5 y Symantec Host, permite a usuarios locales provocar una denegaci\u00f3n de servicio (ca\u00edda del sistema) v\u00eda una informaci\u00f3n inv\u00e1lida, como ha sido demostrado llamando a DeviceIoControl para enviar la informaci\u00f3n." } ], "id": "CVE-2006-4855", "lastModified": "2024-11-21T00:16:54.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-09-19T18:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21938" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1591" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016889" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016892" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016893" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016894" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016895" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016896" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016897" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016898" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/20051" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/20051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 8.0.1 | |
symantec | pcanywhere | 8.0.2 | |
symantec | pcanywhere | 9.0 | |
symantec | pcanywhere | 9.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B543CCFB-954B-4CCF-8BB7-E64DAFA0C1F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "09E5DA00-5FDC-42DE-955B-E977E62A2B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB0C7336-52DC-4E0D-9F6F-9B401B0A93EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "DFDF9CE6-93A7-49EC-B6B5-428C7517E902", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "pcAnywhere 8.x and 9.0 allows remote attackers to cause a denial of service via a TCP SYN scan, e.g. by nmap." } ], "id": "CVE-2000-0324", "lastModified": "2024-11-20T23:32:14.393", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-04-25T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/4347.php" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/1301" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1150" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.3.96.1000425150157.13567A-100000%40sword.damocles.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/4347.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/1301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.3.96.1000425150157.13567A-100000%40sword.damocles.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5.539 | |
symantec | pcanywhere | 12.6.65 | |
symantec | pcanywhere | 12.6.65 | |
symantec | pcanywhere | 12.6.7580 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "067CAB0F-D513-4A70-B6C6-06EE290A2F6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "39F3C225-B890-47BB-9898-0EFEC969B74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "A4C296DE-5385-4C59-8824-B1695D38C332", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp3:*:*:*:*:*:*", "matchCriteriaId": "F1C797C5-7F76-4ECE-859C-B928F380A08D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5.539:*:*:*:*:*:*:*", "matchCriteriaId": "A9C845AC-3C09-4676-964F-644A01D133CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.6.65:*:*:*:*:*:*:*", "matchCriteriaId": "D0D0B814-A9C3-4D47-B1C5-59DE0CFEDCF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.6.65:sp1:*:*:*:*:*:*", "matchCriteriaId": "D2415480-FC3C-45BF-B93C-F76F0C011F97", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.6.7580:*:*:*:*:*:*:*", "matchCriteriaId": "92218E59-B767-498A-8F09-20202AE643E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The host-services component in Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), does not properly filter login and authentication data, which allows remote attackers to execute arbitrary code via a crafted session on TCP port 5631." }, { "lang": "es", "value": "El componente de host de servicios de Symantec pcAnywhere v12.5.x a trav\u00e9s de v12.5.3, y IT Management Suite pcAnywhere Solution v7.0 (aka 12.5.x) y v7.1 (tambi\u00e9n conocido como 12.6.x), de inicio de sesi\u00f3n de filtro y los datos de autenticaci\u00f3n, es que permite control remoto atacantes para ejecutar c\u00f3digo arbitrario a trav\u00e9s de una sesi\u00f3n a mano en el puerto TCP 5631." } ], "id": "CVE-2011-3478", "lastModified": "2024-11-21T01:30:33.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-25T15:55:01.003", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/show/osvdb/78532" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/48092" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/51592" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-12-018/" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/38599/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/show/osvdb/78532" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-12-018/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/38599/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:*:*:*:*:*:*:*:*", "matchCriteriaId": "688690CE-8382-4C88-A0E5-AC0021D9D440", "versionEndIncluding": "12.5.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "23912E29-CA68-4C9A-93DF-586E42CA52F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "447EE4D0-ED48-490E-BC1C-831A165CFF29", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "DFDF9CE6-93A7-49EC-B6B5-428C7517E902", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F0A6A97-1EFF-41C0-AAAA-B357C4C801F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "A496D973-4BC8-4377-8C84-8F2CB281AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF752E6-45B4-4D6D-90F8-AA69DB5C2775", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECE0E3DD-23F9-4ACD-BF9D-986CE5232D4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "39F3C225-B890-47BB-9898-0EFEC969B74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "A4C296DE-5385-4C59-8824-B1695D38C332", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp3:*:*:*:*:*:*", "matchCriteriaId": "F1C797C5-7F76-4ECE-859C-B928F380A08D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5.265:*:*:*:*:*:*:*", "matchCriteriaId": "EE75BA8C-3E29-45CC-BD06-E504513A55AD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "067CAB0F-D513-4A70-B6C6-06EE290A2F6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "39F3C225-B890-47BB-9898-0EFEC969B74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "A4C296DE-5385-4C59-8824-B1695D38C332", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp3:*:*:*:*:*:*", "matchCriteriaId": "F1C797C5-7F76-4ECE-859C-B928F380A08D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5.539:*:*:*:*:*:*:*", "matchCriteriaId": "A9C845AC-3C09-4676-964F-644A01D133CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.6.65:*:*:*:*:*:*:*", "matchCriteriaId": "D0D0B814-A9C3-4D47-B1C5-59DE0CFEDCF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.6.7580:*:*:*:*:*:*:*", "matchCriteriaId": "92218E59-B767-498A-8F09-20202AE643E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_client_management_suite_pcanywhere_solution:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "611D90A6-7B2C-4C40-9C70-EC5B2695FD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_client_management_suite_pcanywhere_solution:12.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "65C22E74-4DBF-4783-B2AF-57C2D58B193D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_client_management_suite_pcanywhere_solution:12.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "04B4C5CC-520C-4005-B01E-4EBC22ABE5FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_client_management_suite_pcanywhere_solution:12.6:*:*:*:*:*:*:*", "matchCriteriaId": "8F8C91B1-46E7-4CA2-8E96-FF16626BFD8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_client_management_suite_pcanywhere_solution:12.6:sp1:*:*:*:*:*:*", "matchCriteriaId": "CEE27DB7-3B9D-487F-83BD-D1D8C1B0E770", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_client_management_suite_pcanywhere_solution:12.6:sp2:*:*:*:*:*:*", "matchCriteriaId": "7F8166A3-90AC-4515-84C2-9E137C66594C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution_remote_pcanywhere_solution:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "2811AA0D-0B6F-49EC-9234-A1836EDBA60B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution_remote_pcanywhere_solution:12.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "48193B5E-994F-4F66-BE15-A44BBE4364C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution_remote_pcanywhere_solution:12.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "FE450255-FE0F-41CE-9BDC-C7870DAB13CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution_remote_pcanywhere_solution:12.6:*:*:*:*:*:*:*", "matchCriteriaId": "1CB20686-F8E4-49A3-9A82-68C929B88FBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution_remote_pcanywhere_solution:12.6:sp1:*:*:*:*:*:*", "matchCriteriaId": "9BA4BAF7-4E24-40BD-8D9E-801BAE52C2D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution_remote_pcanywhere_solution:12.6:sp2:*:*:*:*:*:*", "matchCriteriaId": "53AC95BF-9CD4-47C6-87A7-531EA27AD864", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) do not properly handle the client state after abnormal termination of a remote session, which allows remote attackers to obtain access to the client by leveraging an \"open client session.\"" }, { "lang": "es", "value": "Symantec pcAnywhere hasta la versi\u00f3n v12.5.3, Altiris IT Management Suite pcAnywhere Soluction v7.0 (tambi\u00e9n conocido como v12.5.x) y v7.1 (tambi\u00e9n conocido como v12.6.x), Altiris Client Management Suite pcAnywhere Soluction v7.0 (tambi\u00e9n conocido como v12.5.x) y v7.1 (tambi\u00e9n conocido como v12.6.x) y Altiris Deployment Solution Remote pcAnywhere Solution v7.1 (tambi\u00e9n conocido como v12.5.x y v12.6.x) no manejan correctamente el estado del cliente despu\u00e9s de la terminaci\u00f3n anormal de una sesi\u00f3n remota, lo que permite a atacantes remotos obtener acceso al cliente aprovechandose de una \"sesi\u00f3n de cliente abierta\"." } ], "id": "CVE-2012-0290", "lastModified": "2024-11-21T01:34:43.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-06T20:55:02.627", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/48092" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/51862" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120124_00" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72996" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | * | |
symantec | pcanywhere | 10.0 | |
symantec | pcanywhere | 10.5 | |
symantec | pcanywhere | 11.0 | |
symantec | pcanywhere | 11.0.1 | |
symantec | pcanywhere | 11.5 | |
symantec | pcanywhere | 11.5.1 | |
symantec | pcanywhere | 12.0 | |
symantec | pcanywhere | 12.0.1 | |
symantec | pcanywhere | 12.0.2 | |
symantec | pcanywhere | 12.0.3 | |
symantec | pcanywhere | 12.1 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5 | |
symantec | pcanywhere | 12.5.3 | |
symantec | pcanywhere | 12.5.265 | |
symantec | pcanywhere | 12.5.539 | |
symantec | altiris_client_management_suite_pcanywhere_solution | 7.0 | |
symantec | altiris_climentent_manage_suite_pcanywhere_solution | 7.1 | |
symantec | altiris_deployment_solution_remote_pcanywhere_solution | 7.1 | |
symantec | altiris_it_management_suite_pcanywhere_solution | 7.0 | |
symantec | altiris_it_management_suite_pcanywhere_solution | 7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "439DFE25-7834-4E70-AB3A-47CC76528281", "versionEndIncluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DAB70F5-1B1B-426B-A1F9-6D91D0A160B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F0A6A97-1EFF-41C0-AAAA-B357C4C801F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "014AA70B-942F-4ADE-9EEF-4F5204438268", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D0BF0A19-0AAD-44B2-9B51-85A985CC40A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "A496D973-4BC8-4377-8C84-8F2CB281AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF752E6-45B4-4D6D-90F8-AA69DB5C2775", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13E1710-1723-4A52-ACDC-7FC511467152", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "87DBE939-A827-4B90-A618-AA5A044D74E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D33DDEF5-032D-4AC2-BBCD-6E3D1E06BA1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "16E976A6-625C-4B20-B1F1-429A6902BEF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECE0E3DD-23F9-4ACD-BF9D-986CE5232D4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "067CAB0F-D513-4A70-B6C6-06EE290A2F6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "39F3C225-B890-47BB-9898-0EFEC969B74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "A4C296DE-5385-4C59-8824-B1695D38C332", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E3CA1694-B60F-418A-981D-2393BD74E288", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5.265:*:*:*:*:*:*:*", "matchCriteriaId": "EE75BA8C-3E29-45CC-BD06-E504513A55AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:12.5.539:*:*:*:*:*:*:*", "matchCriteriaId": "A9C845AC-3C09-4676-964F-644A01D133CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:altiris_client_management_suite_pcanywhere_solution:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "068FE96E-DEB9-4AEA-8A5B-9152B75E0C7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_climentent_manage_suite_pcanywhere_solution:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F4F35C05-9068-406F-8B53-B32D83ED1CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution_remote_pcanywhere_solution:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5503E846-7BB7-4B05-B234-609167B443C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_it_management_suite_pcanywhere_solution:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2E8464B-ACB2-4DB7-A0CF-EBF5FC5997A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_it_management_suite_pcanywhere_solution:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D9A6CB3-92E5-40CA-9E00-5C05F478C56C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The awhost32 service in Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) allows remote attackers to cause a denial of service (daemon crash) via a crafted TCP session on port 5631." }, { "lang": "es", "value": "El servicio awhost32 en Symantec pcAnywhere hasta v12.5.3, Altiris IT Management Suite pcAnywhere Solution v7.0 (tambi\u00e9n conocido como v12.5.x) y v7.1 (tambi\u00e9n conocido como v12.6.x), Altiris Client Management Suite pcAnywhere Solution v7.0 (tambi\u00e9n conocido como v12.5.x) y v7.1 (tambi\u00e9n conocido como v12.6.x), y Altiris Deployment Solution Remote pcAnywhere Solution v7.1 (tambi\u00e9n conocido como v12.5.x and v12.6.x), permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una sesi\u00f3n TCP modificada en el puerto 5631." } ], "id": "CVE-2012-0292", "lastModified": "2024-11-21T01:34:44.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-03-08T04:15:02.683", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/48092" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/18493/" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/52094" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120301_00" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/18493/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/52094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2012\u0026suid=20120301_00" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
symantec | pcanywhere | 8.0.1 | |
symantec | pcanywhere | 8.0.2 | |
symantec | pcanywhere | 9.0 | |
symantec | pcanywhere | 9.0.1 | |
symantec | pcanywhere | 9.2 | |
symantec | pcanywhere | 10.0 | |
symantec | pcanywhere | 10.5 | |
symantec | pcanywhere | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:pcanywhere:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B543CCFB-954B-4CCF-8BB7-E64DAFA0C1F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "09E5DA00-5FDC-42DE-955B-E977E62A2B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB0C7336-52DC-4E0D-9F6F-9B401B0A93EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F96BE1D8-29D3-41F1-9CE9-66D5D8013C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "DFDF9CE6-93A7-49EC-B6B5-428C7517E902", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DAB70F5-1B1B-426B-A1F9-6D91D0A160B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F0A6A97-1EFF-41C0-AAAA-B357C4C801F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "014AA70B-942F-4ADE-9EEF-4F5204438268", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec pcAnywhere 10.5x and 11.x before 11.5, with \"Launch with Windows\" enabled, allows local users with physical access to execute arbitrary commands via the Caller Properties feature." } ], "id": "CVE-2005-1970", "lastModified": "2024-11-20T23:58:31.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-06-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/15673" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.06.10.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014178" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/13933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/15673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.06.10.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/13933" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-200609-0473
Vulnerability from variot
The \Device\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data. Multiple Symantec products are prone to a local denial-of-service vulnerability. This issue occurs when attackers send malformed data to the 'SymEvent' driver. A local authenticated attacker may exploit this issue to crash affected computers, denying service to legitimate users. Please see the vulnerable systems section for details regarding affected Symantec products. Norton does not adequately protect the \Device\SymEvent driver, nor does it validate its input buffer, allowing Everyone to write data to this driver, which may cause the driver to perform invalid memory operations and crash the entire operating system.
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.
The vulnerability is caused due to an error in the handling of data sent to the "\Device\SymEvent" device which is writable by "Everyone". Other versions may also be affected.
SOLUTION: Grant only trusted users access to affected systems.
PROVIDED AND/OR DISCOVERED BY: David Matousek
ORIGINAL ADVISORY: http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200609-0473", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pcanywhere", "scope": "eq", "trust": 2.7, "vendor": "symantec", "version": "11.5" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "2006" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "2004" }, { "model": "norton system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2004" }, { "model": "norton system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2005_premier" }, { "model": "norton system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2004_professional_edition" }, { "model": "norton system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2005" }, { "model": "norton system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2006" }, { "model": "norton system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2003_professional_edition" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2004" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2003" }, { "model": "norton internet security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2003" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2006" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2005" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2004" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2.0" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "1.1" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "1.0" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1_build8.1.1.314a" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr1_build_8.1.1.314a" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.0.1.501" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1_build393" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.1_build_8.01.434" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.1_build_8.01.471" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.3_build_9.0.3.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.434" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2002" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.0.1.425a" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.0.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.460" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "host ids", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "*" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.457" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr3_build_8.1.1.323" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.5.1100" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.1_build_8.01.425a" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.1_build_8.01.501" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.1_build_8.01.429c" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.471" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1_stm_b8.1.0.825a" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr6_b8.1.1.266" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.5_build_1100" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0_build_8.01.9374" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.3.1000" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.1_build_8.01.464" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.1_build_8.01.457" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1.319" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0_scf_7.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.4" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.0.1.425c" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr2_build_8.1.1.319" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.0_b8.01.9378" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0_stm_build_9.0.0.338" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.1_build_8.01.437" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.0.1.9374" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1.323" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.1_build_8.01.446" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2010" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.0.1.9378" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr5_build_8.1.1.336" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2011" }, { "model": "norton internet security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2006" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1.329" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr4_build_8.1.1.329" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.2.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.0.338" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.437" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.1_build_9.0.1.1000" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.2_build_9.0.2.1000" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_build_393" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.446" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0.1_build_8.01.460" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.0.825a" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.464" }, { "model": "norton internet security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2007" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1.377" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2020" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2007" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.5" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2001" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1.366" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2003" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2021" }, { "model": "client security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "1.x" }, { "model": "client security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2.x" }, { "model": "client security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "3.0 and 3.1" }, { "model": "host ids", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "corporate edition savce 8.x" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "9.x" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "10.0 and 10.1" }, { "model": "norton internet security", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2006 9.1.0.33" }, { "model": "norton systemworks", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20060" }, { "model": "norton systemworks premier", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "norton systemworks professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton systemworks professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2006" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "norton antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20030" }, { "model": "host ids", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "0" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.51100" }, { "model": "client security mr3 b9.0.3.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.3" }, { "model": "client security mr2 b9.0.2.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.2" }, { "model": "client security mr1 b9.0.1.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.1" }, { "model": "client security stm build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.09.0.0.338" }, { "model": "client security (scf", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.07.1)" }, { "model": "client security mr5 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.336" }, { "model": "client security mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.329" }, { "model": "client security mr3 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.323" }, { "model": "client security mr2 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.319" }, { "model": "client security mr1 build 8.1.1.314a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1393" }, { "model": "client security mr6 b8.1.1.266", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "client security stm b8.1.0.825a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1" }, { "model": "client security mr8 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.471" }, { "model": "client security mr7 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.464" }, { "model": "client security mr6 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.460" }, { "model": "client security mr5 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.457" }, { "model": "client security mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.446" }, { "model": "client security mr3 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.434" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.437" }, { "model": "client security mr9 b8.01.501", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security mr2 b8.01.429c", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security mr1 b8.01.425a/b", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security b8.01.9378", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.0" }, { "model": "client security b8.01.9374", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2021" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2020" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2011" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2010" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2002" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2001" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.5.1100" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.5" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.4" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.3.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.0.338" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.329" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.323" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.319" }, { "model": "antivirus corporate edition build 8.1.1.314a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1393" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1.377" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1.366" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.471" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.464" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.460" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.457" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.446" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.437" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.434" }, { "model": "antivirus corporate edition .0.825a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01.9378" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01.9374" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01.501" }, { "model": "antivirus corporate edition 1.429c", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "antivirus corporate edition 1.425a/b", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" } ], "sources": [ { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2006-003187" }, { "db": "CNNVD", "id": "CNNVD-200609-347" }, { "db": "NVD", "id": "CVE-2006-4855" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:client_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:host_ids", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_internet_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_personal_firewall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_system_works", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:pcanywhere", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-003187" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "David Matousek david@matousec.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-347" } ], "trust": 0.6 }, "cve": "CVE-2006-4855", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2006-4855", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-20963", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-4855", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2006-4855", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200609-347", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-20963", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-20963" }, { "db": "JVNDB", "id": "JVNDB-2006-003187" }, { "db": "CNNVD", "id": "CNNVD-200609-347" }, { "db": "NVD", "id": "CVE-2006-4855" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The \\Device\\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data. Multiple Symantec products are prone to a local denial-of-service vulnerability. This issue occurs when attackers send malformed data to the \u0027SymEvent\u0027 driver. \nA local authenticated attacker may exploit this issue to crash affected computers, denying service to legitimate users. \nPlease see the vulnerable systems section for details regarding affected Symantec products. Norton does not adequately protect the \\Device\\SymEvent driver, nor does it validate its input buffer, allowing Everyone to write data to this driver, which may cause the driver to perform invalid memory operations and crash the entire operating system. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nThe vulnerability is caused due to an error in the handling of data\nsent to the \"\\Device\\SymEvent\" device which is writable by\n\"Everyone\". \nOther versions may also be affected. \n\nSOLUTION:\nGrant only trusted users access to affected systems. \n\nPROVIDED AND/OR DISCOVERED BY:\nDavid Matousek\n\nORIGINAL ADVISORY:\nhttp://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-4855" }, { "db": "JVNDB", "id": "JVNDB-2006-003187" }, { "db": "BID", "id": "20051" }, { "db": "VULHUB", "id": "VHN-20963" }, { "db": "PACKETSTORM", "id": "50081" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-20963", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-20963" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-4855", "trust": 2.8 }, { "db": "BID", "id": "20051", "trust": 2.0 }, { "db": "SECUNIA", "id": "21938", "trust": 1.8 }, { "db": "SECTRACK", "id": "1016897", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016895", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016898", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016892", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016889", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016894", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016893", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016896", "trust": 1.7 }, { "db": "SREASON", "id": "1591", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-3636", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2006-003187", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200609-347", "trust": 0.7 }, { "db": "XF", "id": "28960", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060915 SYMANTEC NORTON INSUFFICIENT VALIDATION OF \u0027SYMEVENT\u0027 DRIVER INPUT BUFFER", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-82146", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "28588", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-20963", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50081", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-20963" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2006-003187" }, { "db": "PACKETSTORM", "id": "50081" }, { "db": "CNNVD", "id": "CNNVD-200609-347" }, { "db": "NVD", "id": "CVE-2006-4855" } ] }, "id": "VAR-200609-0473", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-20963" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:28:25.895000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SYM06-018", "trust": 0.8, "url": "http://www.symantec.com/avcenter/security/Content/2006.09.20a.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-003187" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-20963" }, { "db": "JVNDB", "id": "JVNDB-2006-003187" }, { "db": "NVD", "id": "CVE-2006-4855" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://www.matousec.com/info/advisories/norton-insufficient-validation-of-symevent-driver-input-buffer.php" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/20051" }, { "trust": 1.7, "url": "http://securityresponse.symantec.com/avcenter/security/content/2006.09.20a.html" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016889" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016892" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016893" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016894" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016895" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016896" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016897" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016898" }, { "trust": 1.7, "url": "http://secunia.com/advisories/21938" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/1591" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4855" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4855" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/28960" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/446111/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3636" }, { "trust": 0.3, "url": "http://www.symantec.com/sabu/nis/npf/" }, { "trust": 0.3, "url": "http://www.symantec.com/avcenter/security/content/2006.09.20a.html" }, { "trust": 0.3, "url": "/archive/1/446111" }, { "trust": 0.1, "url": "http://secunia.com/product/6638/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/quality_assurance_analyst/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/21938/" }, { "trust": 0.1, "url": "http://secunia.com/product/6637/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/web_application_security_specialist/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-20963" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2006-003187" }, { "db": "PACKETSTORM", "id": "50081" }, { "db": "CNNVD", "id": "CNNVD-200609-347" }, { "db": "NVD", "id": "CVE-2006-4855" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-20963" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2006-003187" }, { "db": "PACKETSTORM", "id": "50081" }, { "db": "CNNVD", "id": "CNNVD-200609-347" }, { "db": "NVD", "id": "CVE-2006-4855" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-19T00:00:00", "db": "VULHUB", "id": "VHN-20963" }, { "date": "2006-09-15T00:00:00", "db": "BID", "id": "20051" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-003187" }, { "date": "2006-09-16T01:17:17", "db": "PACKETSTORM", "id": "50081" }, { "date": "2006-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-347" }, { "date": "2006-09-19T18:07:00", "db": "NVD", "id": "CVE-2006-4855" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-17T00:00:00", "db": "VULHUB", "id": "VHN-20963" }, { "date": "2015-05-12T19:49:00", "db": "BID", "id": "20051" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-003187" }, { "date": "2006-09-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-347" }, { "date": "2024-11-21T00:16:54.200000", "db": "NVD", "id": "CVE-2006-4855" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "20051" }, { "db": "PACKETSTORM", "id": "50081" }, { "db": "CNNVD", "id": "CNNVD-200609-347" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec Norton Personal Firewall Such as \\Device\\SymEvent Service disruption in drivers (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-003187" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-347" } ], "trust": 0.6 } }
var-200703-0519
Vulnerability from variot
The \Device\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.1.7, and possibly other products using symevent.sys 12.0.0.20, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data, a reintroduction of CVE-2006-4855. This vulnerability CVE-2006-4855 It is a reproduction.Local user disrupts service operation via invalid data ( System crash ) It may be in a state. This issue occurs when attackers send malformed data to the 'SymEvent' driver. A local authenticated attacker may exploit this issue to crash affected computers, denying service to legitimate users. Symantec is currently investigating this issue; this BID will be updated as more information becomes available. NOTE: This BID is being retired because it is already covered in BID 20051. Please see the vulnerable systems section for details regarding affected Symantec products. This vulnerability is a re-reference of CVE-2006-4855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200703-0519", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "norton personal firewall", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2006_9.1.1.7" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2006 9.1.1.7" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20069.1.1.7" }, { "model": "pcanywhere", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "11.5" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20060" }, { "model": "norton systemworks premier", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "norton systemworks professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton systemworks professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2006" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2006" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2006" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20030" }, { "model": "host ids", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "0" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.51100" }, { "model": "client security mr3 b9.0.3.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.3" }, { "model": "client security mr2 b9.0.2.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.2" }, { "model": "client security mr1 b9.0.1.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.1" }, { "model": "client security stm build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.09.0.0.338" }, { "model": "client security (scf", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.07.1)" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0" }, { "model": "client security mr5 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.336" }, { "model": "client security mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.329" }, { "model": "client security mr3 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.323" }, { "model": "client security mr2 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.319" }, { "model": "client security mr1 build 8.1.1.314a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1393" }, { "model": "client security mr6 b8.1.1.266", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "client security stm b8.1.0.825a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1" }, { "model": "client security mr8 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.471" }, { "model": "client security mr7 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.464" }, { "model": "client security mr6 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.460" }, { "model": "client security mr5 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.457" }, { "model": "client security mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.446" }, { "model": "client security mr3 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.434" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.437" }, { "model": "client security mr9 b8.01.501", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security mr2 b8.01.429c", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security mr1 b8.01.425a/b", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security b8.01.9378", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.0" }, { "model": "client security b8.01.9374", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2021" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2020" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2011" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2010" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2002" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2001" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.5.1100" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.5" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.4" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.3.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.0.338" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.329" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.323" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.319" }, { "model": "antivirus corporate edition build 8.1.1.314a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1393" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1.377" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1.366" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.471" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.464" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.460" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.457" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.446" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.437" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.434" }, { "model": "antivirus corporate edition .0.825a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01.9378" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01.9374" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01.501" }, { "model": "antivirus corporate edition 1.429c", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "antivirus corporate edition 1.425a/b", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" } ], "sources": [ { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "CNNVD", "id": "CNNVD-200703-422" }, { "db": "NVD", "id": "CVE-2007-1495" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:norton_personal_firewall", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005254" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovery is credited to David Matousek.", "sources": [ { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "CNNVD", "id": "CNNVD-200703-422" } ], "trust": 1.2 }, "cve": "CVE-2007-1495", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2007-1495", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-24857", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-1495", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2007-1495", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200703-422", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-24857", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-24857" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "CNNVD", "id": "CNNVD-200703-422" }, { "db": "NVD", "id": "CVE-2007-1495" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The \\Device\\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.1.7, and possibly other products using symevent.sys 12.0.0.20, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data, a reintroduction of CVE-2006-4855. This vulnerability CVE-2006-4855 It is a reproduction.Local user disrupts service operation via invalid data ( System crash ) It may be in a state. This issue occurs when attackers send malformed data to the \u0027SymEvent\u0027 driver. \nA local authenticated attacker may exploit this issue to crash affected computers, denying service to legitimate users. Symantec is currently investigating this issue; this BID will be updated as more information becomes available. \nNOTE: This BID is being retired because it is already covered in BID 20051. \nPlease see the vulnerable systems section for details regarding affected Symantec products. This vulnerability is a re-reference of CVE-2006-4855", "sources": [ { "db": "NVD", "id": "CVE-2007-1495" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "VULHUB", "id": "VHN-24857" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-1495", "trust": 2.8 }, { "db": "BID", "id": "22961", "trust": 2.0 }, { "db": "SREASON", "id": "2445", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-005254", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200703-422", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20070314 SYMEVENT DRIVER LOCAL ACCESS SYSTEM DENIAL OF SERVICE", "trust": 0.6 }, { "db": "BID", "id": "20051", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-24857", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-24857" }, { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "CNNVD", "id": "CNNVD-200703-422" }, { "db": "NVD", "id": "CVE-2007-1495" } ] }, "id": "VAR-200703-0519", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-24857" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:28:25.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Norton Personal Firewall", "trust": 0.8, "url": "http://us.norton.com/now/en/pu/images/Promotions/2012/5804/ch2.html?undefined\u0026s_tnt=48837:19:0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005254" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-1495" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/22961" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/2445" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/462792/100/0/threaded" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1495" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1495" }, { "trust": 0.6, "url": "http://www.symantec.com/sabu/nis/npf/" }, { "trust": 0.6, "url": "/archive/1/446111" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/462792/100/0/threaded" }, { "trust": 0.3, "url": "/archive/1/462792" }, { "trust": 0.3, "url": "http://www.symantec.com/avcenter/security/content/2006.09.20a.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-24857" }, { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "CNNVD", "id": "CNNVD-200703-422" }, { "db": "NVD", "id": "CVE-2007-1495" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-24857" }, { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "CNNVD", "id": "CNNVD-200703-422" }, { "db": "NVD", "id": "CVE-2007-1495" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-16T00:00:00", "db": "VULHUB", "id": "VHN-24857" }, { "date": "2007-03-14T00:00:00", "db": "BID", "id": "22961" }, { "date": "2006-09-15T00:00:00", "db": "BID", "id": "20051" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "date": "2007-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200703-422" }, { "date": "2007-03-16T22:19:00", "db": "NVD", "id": "CVE-2007-1495" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-16T00:00:00", "db": "VULHUB", "id": "VHN-24857" }, { "date": "2007-07-03T22:17:00", "db": "BID", "id": "22961" }, { "date": "2015-05-12T19:49:00", "db": "BID", "id": "20051" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "date": "2007-03-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200703-422" }, { "date": "2024-11-21T00:28:27.257000", "db": "NVD", "id": "CVE-2007-1495" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "CNNVD", "id": "CNNVD-200703-422" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec Norton Personal Firewall Such as \\Device\\SymEvent Service disruption in drivers (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005254" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Failure to Handle Exceptional Conditions", "sources": [ { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" } ], "trust": 0.6 } }