CVE-2007-2619
https://notcve.org/view.php?id=CVE-2007-2619
Symantec pcAnywhere 11.5.x and 12.0.x retains unencrypted login credentials for the most recent login within process memory, which allows local administrators to obtain the credentials by reading process memory, a different vulnerability than CVE-2006-3785. Symantec pcAnywhere 11.5.x y 12.0.x retiene credenciales de autenticación no cifradas para la última autenticación en la memoria del proceso, lo cual permite a administradores locales obtener las credenciales al leer la memoria del proceso, vulnerabilidad diferente de CVE-2006-3785. • http://osvdb.org/41982 http://securityresponse.symantec.com/avcenter/security/Content/2007.05.09b.html http://securitytracker.com/id?1018032 http://www.securityfocus.com/bid/23875 http://www.vupen.com/english/advisories/2007/1753 https://exchange.xforce.ibmcloud.com/vulnerabilities/34203 •
CVE-2006-3456
https://notcve.org/view.php?id=CVE-2006-3456
The Symantec NAVOPTS.DLL ActiveX control (aka Symantec.Norton.AntiVirus.NAVOptions) 12.2.0.13, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, is designed for use only in application-embedded web browsers, which allows remote attackers to "crash the control" via unspecified vectors related to content on a web site, and place Internet Explorer into a "defunct state" in which remote attackers can execute arbitrary code in addition to other Symantec ActiveX controls, regardless of whether they are marked safe for scripting. NOTE: this CVE was inadvertently used for an E-mail Auto-Protect issue, but that issue has been assigned CVE-2007-3771. El control ActiveX Symantec NAVOPTS.DLL (también se conoce como Symantec.Norton.AntiVirus.NAVOptions) versión 12.2.0.13, tal y como es usado en Norton AntiVirus, Internet Security y System Works 2005 y 2006, está diseñado para usarse únicamente en navegadores web integrados en aplicaciones, lo que permite atacantes remotos "crash the control" por medio de vectores no especificados relacionados con el contenido en un sitio web, y colocar Internet Explorer en un "defunct state" en el que los atacantes remotos pueden ejecutar código arbitrario además de otros controles ActiveX de Symantec, independientemente de si están marcados como seguros para el scripting. NOTA: este CVE fue utilizado inadvertidamente para un problema de protección automática de correo electrónico, pero a ese problema ha sido asignado CVE-2007-3771. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529 http://osvdb.org/35075 http://secunia.com/advisories/25172 http://www.securityfocus.com/bid/23822 http://www.securitytracker.com/id?1018031 http://www.symantec.com/avcenter/security/Content/2007.05.09.html http://www.vupen.com/english/advisories/2007/1751 https://exchange.xforce.ibmcloud.com/vulnerabilities/34200 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-2375
https://notcve.org/view.php?id=CVE-2007-2375
The agent remote upgrade interface in Symantec Enterprise Security Manager (ESM) before 20070405 does not verify the authenticity of upgrades, which allows remote attackers to execute arbitrary code via software that implements the agent upgrade protocol. El agente remoto de la interfaz de actualización en Symantec Enterprise Security Manager (ESM) anterior a 20070405 no verifica la autenticidad de las actualizaciones, lo cual permite a un atacante remoto ejecutar código de su elección a través de software que implemente el agente del protocolo de actualización. • http://secunia.com/advisories/24767 http://www.securityfocus.com/bid/23287 http://www.securitytracker.com/id?1017881 http://www.symantec.com/avcenter/security/Content/2007.04.05d.html http://www.vupen.com/english/advisories/2007/1277 •
CVE-2007-2361
https://notcve.org/view.php?id=CVE-2007-2361
Symantec Norton Ghost, Norton Save & Recovery, LiveState Recovery, and BackupExec System Recovery before 20070426, when remote backups of restore points images are configured, uses weak permissions (world readable) for a configuration file with network share credentials, which allows local users to obtain the credentials by reading the file. Symantec Norton Ghost, Norton Save & Recovery, LiveState Recovery, y BackupExec System Recovery versiones anteriores a 20070426, cuando están configurados copias de respaldo remotas o imágenes de puntos de restauranción, utiliza permisos débiles (leibles por todos) para un fichero de configuración con credenciales de carpetas compartidas de red, lo cual permite a usuarios locales obtener las credenciales al leer el fichero. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=520 http://secunia.com/advisories/25013 http://www.securitytracker.com/id?1017971 http://www.symantec.com/avcenter/security/Content/2007.04.26.html http://www.vupen.com/english/advisories/2007/1552 https://exchange.xforce.ibmcloud.com/vulnerabilities/33929 •
CVE-2007-2359
https://notcve.org/view.php?id=CVE-2007-2359
Buffer overflow in Ghost Service Manager, as used in Symantec Norton Ghost, Norton Save & Recovery, LiveState Recovery, and BackupExec System Recovery before 20070426, allows local users to gain privileges via a long string. Desbordamiento de búfer en Ghost Service Manager, tal y como se usa en Symantec Norton Ghost, Norton Save & Recovery, LiveState Recovery, y BackupExec System Recovery versiones anteriores a 20070426, permite a usuarios locales obtener privilegios mediante una cadena larga. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=519 http://secunia.com/advisories/25013 http://www.securitytracker.com/id?1017971 http://www.symantec.com/avcenter/security/Content/2007.04.26.html http://www.vupen.com/english/advisories/2007/1552 https://exchange.xforce.ibmcloud.com/vulnerabilities/33931 •