4 results (0.005 seconds)

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

The agent and task-agent components in Symantec Management Platform 7.0 and 7.1 before 7.1 SP2 Mp1.1v7 rollup, as used in certain Altiris products, use the same registry-entry encryption key across different customers' installations, which makes it easier for local users to obtain sensitive information about package-server access, or cause a denial of service, by leveraging knowledge of this key. Los componentes del agente y del task-agent de Symantec Management Platform 7.0 y 7.1 SP2 Mp1.1v7 rollup, tal como se utiliza en algunos productos de Altiris, utilizan la misma clave de cifrado a través del registro de entrada para instalaciones de diferentes clientes, lo que hace que sea más fácil para los usuarios locales obtener información sensible acerca del acceso de paquetes del servidor, o causar una denegación de servicio, mediante el aprovechamiento de los conocimientos de esta clave. • http://www.securityfocus.com/bid/62757 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20131008_00 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 71%CPEs: 30EXPL: 2

The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method. En Altiris eXpress NS SC la descarga del control ActiveX en AeXNSPkgDLLib.dll, como en Symantec Altiris Deployment Solution v6.9.x, Notification Server v6.0.x, y Symantec Management Platform v7.0.x expone un método inseguro, que permite a atacantes remotos forzar la descarga de archivos arbitrarios y, posiblemente, ejecutar código arbitrario a través del método DownloadAndInstall. • https://www.exploit-db.com/exploits/16600 http://secunia.com/advisories/36679 http://www.osvdb.org/57893 http://www.securityfocus.com/bid/36346 http://www.symantec.com/business/support/index?page=content&id=TECH44885 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090922_00 •

CVSS: 9.3EPSS: 96%CPEs: 16EXPL: 2

Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument. Desbordamiento de búfer en el método RunCmd en Altiris eXpress NS Console Utilities ActiveX control en AeXNSConsoleUtilities.dll en la consola web de Symantec Altiris Deployment Solution v6.9.x, Altiris Notification Server v6.0.x, y Management Platform v7.0.x permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga en el segundo argumento. • https://www.exploit-db.com/exploits/16528 http://osvdb.org/60496 http://www.securityfocus.com/bid/37092 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091124_00 http://www.vupen.com/english/advisories/2009/3328 https://exchange.xforce.ibmcloud.com/vulnerabilities/54415 https://kb.altiris.com/article.asp?article=50072&p=1 https://kb.altiris.com/article.asp?article=50279&p=1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 95%CPEs: 13EXPL: 4

Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument. Desbordamiento de búfer basado en pila en el método BrowseAndSaveFile en el control ActiveX ConsoleUtilities v6.0.0.1846 en AeXNSConsoleUtilities.dll en Symantec Altiris Notification Server (NS) v6.0 anterior a R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution v6.9 SP3, y Symantec Management Platform (SMP) v7.0 anterior a SP3, permite a atacantes remotos ejecutar código de su elección a través de una cadena larga en el segundo argumento. • https://www.exploit-db.com/exploits/9853 https://www.exploit-db.com/exploits/16613 http://sotiriu.de/adv/NSOADV-2009-001.txt http://www.securityfocus.com/archive/1/507625/100/0/threaded http://www.securityfocus.com/bid/36698 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00 http://www.vupen.com/english/advisories/2009/3117 https://kb.altiris.com/article.asp?article=49389&p=1 https://kb& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •