Page 4 of 22 results (0.004 seconds)

CVSS: 9.3EPSS: 18%CPEs: 168EXPL: 0

Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives. Desbordamiento de búfer basado en pila en el componente Decomposer en múltiples producto Symantec que permiten a atacantes remotos ejecutar código de su elección a través de archivos .CAB manipulados. This vulnerability allows remote attackers to execute arbitrary code on systems with affected installations of Symantec's AntiVirus Engine. User interaction is not required to exploit this vulnerability. The specific flaw exists during the process of scanning multiple maliciously formatted CAB archives. The parsing routine implicitly trusts certain user-supplied values that can result in an exploitable heap corruption. • http://osvdb.org/36118 http://secunia.com/advisories/26053 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html http://www.securityfocus.com/bid/24282 http://www.vupen.com/english/advisories/2007/2508 http://www.zerodayinitiative.com/advisories/ZDI-07-040.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 15%CPEs: 168EXPL: 0

The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header. El componente Decomposer en múltiples productos Symantec permite a atacantes remotos provocar denegación de servicio (bucles infinitos) a través de ciertos valores en el campo PACK_SIZE de una cabecera de archivo RAR. This vulnerability allows attackers to create a denial of service condition on software with vulnerable installations of the Symantec's AntiVirus engine. Authentication is not required to exploit this vulnerability. The specific flaw resides in a forged PACK_SIZE field of a RAR file header. By setting this field to a specific value an infinite loop denial of service condition will occur when the scanner processes the file. • http://osvdb.org/36119 http://secunia.com/advisories/26053 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html http://www.securityfocus.com/bid/24282 http://www.vupen.com/english/advisories/2007/2508 http://www.zerodayinitiative.com/advisories/ZDI-07-039.html •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

libdayzero.dll in the Filter Hub Service (filter-hub.exe) in Symantec Mail Security for SMTP before 5.0.1 Patch 181 and Mail Security Appliance before 5.0.0-36 allows remote attackers to cause a denial of service (crash) via a crafted executable attachment in an e-mail, involving the detection of "PE-Shield v0.2" and "ASPack v1.00-1.08.02". libdayzero.dll en el servicio Filter Hub (filter-hub.exe) en Symantec Mail Security para SMTP anterior a 5.0.1 Patch 181 y Mail Security Appliance anterior a 5.0.0-36 permite a atacantes remotos provocar denegación de servicio (caida) a través de adjuntos ejecutables manipulados en un e-mail, afectando a la detección de "PE-Shield v0.2" y "ASPack v1.00-1.08.02". • http://osvdb.org/36110 http://secunia.com/advisories/24632 http://secunia.com/secunia_research/2007-48/advisory http://securityresponse.symantec.com/avcenter/security/Content/2007.06.26.html http://www.securityfocus.com/archive/1/472440/100/0/threaded http://www.securityfocus.com/bid/24625 http://www.securitytracker.com/id?1018301 http://www.vupen.com/english/advisories/2007/2335 https://exchange.xforce.ibmcloud.com/vulnerabilities/35105 •

CVSS: 9.3EPSS: 6%CPEs: 1EXPL: 0

Buffer overflow in Symantec Mail Security for SMTP 5.0 before Patch 175 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted headers in an e-mail message. NOTE: some information was obtained from third party sources. Desbordamiento de búfer en Symantec Mail Security para SMTP 5.0 anterior a Patch 175 permite a atacantes remotos provocar denegación de servicio (caida) y posiblemente ejecutar código de su elección a través de cabeceras manipuladas en un mensaje e-mail. NOTA: algunas de estas informaciones se obtuvieron de terceras fuentes de información. • ftp://ftp.symantec.com/public/english_us_canada/products/symantec_mail_security/5.0_smtp/updates/release_notes_p175.txt http://osvdb.org/33840 http://secunia.com/advisories/24371 http://www.kb.cert.org/vuls/id/875633 http://www.securityfocus.com/bid/22782 http://www.securitytracker.com/id?1017716 http://www.vupen.com/english/advisories/2007/0799 https://exchange.xforce.ibmcloud.com/vulnerabilities/32781 •

CVSS: 5.0EPSS: 65%CPEs: 1EXPL: 0

Premium Antispam in Symantec Mail Security for Domino Server 5.1.x before 5.1.2.28 does not filter certain SMTP address formats, which allows remote attackers to use the product as a spam relay. Premium Antispam de Symantec Mail Security para Domino Server 5.1.x anterioers a 5.1.2.28 no filtra formatos de direcciones SMTP concretas, que permite a atacantes remotos utilizar el producto como un retransmisor de correo no deseado (spam). • http://secunia.com/advisories/22490 http://securityresponse.symantec.com/avcenter/security/Content/2006.10.19.html http://securitytracker.com/id?1017094 http://www.osvdb.org/29895 http://www.securityfocus.com/bid/19866 http://www.vupen.com/english/advisories/2006/4118 https://exchange.xforce.ibmcloud.com/vulnerabilities/29676 •