CVE-2007-2950
https://notcve.org/view.php?id=CVE-2007-2950
Centennial Discovery 2006 Feature Pack 1, which is used by (1) Numara Asset Manager 8.0 and (2) Symantec Discovery 6.5, uses insecure permissions on certain directories, which allows local users to gain privileges. Centennial Discovery 2006 Feature Pack 1, el cual es usado por (1) Numara Asset Manager 8.0 y (2) Symantec Discovery 6.5, utiliza permisos no seguros sobre ciertos directorios, el cual permite a usuarios locales ganar privilegios. • http://secunia.com/advisories/25354 http://secunia.com/advisories/25374 http://secunia.com/advisories/25379 http://secunia.com/secunia_research/2007-58/advisory http://secunia.com/secunia_research/2007-59/advisory http://secunia.com/secunia_research/2007-60/advisory http://www.securityfocus.com/bid/25000 http://www.vupen.com/english/advisories/2007/2599 http://www.vupen.com/english/advisories/2007/2600 http://www.vupen.com/english/advisories/2007/2603 https://exchange.xfor •
CVE-2007-3800
https://notcve.org/view.php?id=CVE-2007-3800
Unspecified vulnerability in the Real-time scanner (RTVScan) component in Symantec AntiVirus Corporate Edition 9.0 through 10.1 and Client Security 2.0 through 3.1, when the Notification Message window is enabled, allows local users to gain privileges via crafted code. Vulnerabilidad no especificada en el componente Real-time scanner (RTVScan) en Symantec AntiVirus Corporate Edition 9.0 hasta la 10.1 y Client Security 2.0 hasta la 3.1, cuando la ventana Notification Message está activada, permite a usuarios locales ganar privilegios a través de código manipulado. • http://osvdb.org/36116 http://secunia.com/advisories/26054 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11c.html http://www.securityfocus.com/bid/24810 http://www.vupen.com/english/advisories/2007/2506 https://exchange.xforce.ibmcloud.com/vulnerabilities/35352 •
CVE-2007-3771
https://notcve.org/view.php?id=CVE-2007-3771
Stack-based buffer overflow in the Internet E-mail Auto-Protect feature in Symantec AntiVirus Corporate Edition before 10.1, and Client Security before 3.1, allows local users to cause a denial of service (service crash) via a long (1) To, (2) From, or (3) Subject header in an outbound SMTP e-mail message. NOTE: the original vendor advisory referenced CVE-2006-3456, but this was an error. Desbordamiento de búfer basado en pila en la característica Internet E-mail Auto-Protect de Symantec AntiVirus Corporate Edition anterior a 10.1, y Client Security anterior a 3.1, permite a usuarios locales provocar una denegación de servicio (caída del servicio) mediante cabeceras (1) To, (2) From, o (3) Subject largas en un mensaje de correo electrónico SMTP saliente. NOTA: la notificación original del fabricante hacía referencia a CVE-2006-3456, lo cual fue un error. • http://osvdb.org/36115 http://secunia.com/advisories/26036 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11b.html http://securitytracker.com/id?1018367 http://securitytracker.com/id?1018371 http://www.securityfocus.com/bid/24802 http://www.vupen.com/english/advisories/2007/2506 https://exchange.xforce.ibmcloud.com/vulnerabilities/35354 •
CVE-2007-3673 – Symantec AntiVirus - 'symtdi.sys' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2007-3673
Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\symTDI\, which results in memory overwrite. Symantec symtdi.sys versiones anteriores a 7.0.0, tal y como se distribuye en Symantec AntiVirus Corporate Edition 9 hata 10.1 y Client Security 2.0 hasta 3.1, Norton AntiSpam 2005, y Norton AntiVirus, Internet Security, Personal Firewall, y System Works 2005 y 2006; permite a usuarios locales obtener privilegios mediante un Interrupt Request Packet (Irp) manipulado en una petición IOCTL 0x83022323 a \\symTDI\, que resulta en una sobre-escritura de memoria. • https://www.exploit-db.com/exploits/4178 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554 http://osvdb.org/36117 http://secunia.com/advisories/26042 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html http://securitytracker.com/id?1018372 http://www.securityfocus.com/bid/22351 http://www.vupen.com/english/advisories/2007/2507 https://exchange.xforce.ibmcloud.com/vulnerabilities/35347 •
CVE-2007-3509
https://notcve.org/view.php?id=CVE-2007-3509
Heap-based buffer overflow in the RPC subsystem in Symantec Backup Exec for Windows Servers 10.0, 10d, and 11d allows remote attackers to cause a denial of service (process exit) and possibly execute arbitrary code via crafted ncacn_ip_tcp requests. Desbordamiento de búfer basado en montículo en el subsistema RPC de Symantec Backup Exec para Windows Servers 10.0, 10d, y 11d permite a atacantes remotos provocar una denegación de servicio (terminación del proceso) y posiblemente ejecutar código de su elección mediante peticiones ncacn_ip_tcp manipuladas. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=553 http://secunia.com/advisories/26032 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11a.html http://www.kb.cert.org/vuls/id/213697 http://www.osvdb.org/36111 http://www.securityfocus.com/bid/23897 http://www.securitytracker.com/id?1018366 http://www.vupen.com/english/advisories/2007/2505 https://exchange.xforce.ibmcloud.com/vulnerabilities/35340 •