10 results (0.015 seconds)

CVSS: 6.8EPSS: 71%CPEs: 30EXPL: 2

The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method. En Altiris eXpress NS SC la descarga del control ActiveX en AeXNSPkgDLLib.dll, como en Symantec Altiris Deployment Solution v6.9.x, Notification Server v6.0.x, y Symantec Management Platform v7.0.x expone un método inseguro, que permite a atacantes remotos forzar la descarga de archivos arbitrarios y, posiblemente, ejecutar código arbitrario a través del método DownloadAndInstall. • https://www.exploit-db.com/exploits/16600 http://secunia.com/advisories/36679 http://www.osvdb.org/57893 http://www.securityfocus.com/bid/36346 http://www.symantec.com/business/support/index?page=content&id=TECH44885 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090922_00 •

CVSS: 9.3EPSS: 96%CPEs: 16EXPL: 2

Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument. Desbordamiento de búfer en el método RunCmd en Altiris eXpress NS Console Utilities ActiveX control en AeXNSConsoleUtilities.dll en la consola web de Symantec Altiris Deployment Solution v6.9.x, Altiris Notification Server v6.0.x, y Management Platform v7.0.x permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga en el segundo argumento. • https://www.exploit-db.com/exploits/16528 http://osvdb.org/60496 http://www.securityfocus.com/bid/37092 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091124_00 http://www.vupen.com/english/advisories/2009/3328 https://exchange.xforce.ibmcloud.com/vulnerabilities/54415 https://kb.altiris.com/article.asp?article=50072&p=1 https://kb.altiris.com/article.asp?article=50279&p=1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 95%CPEs: 13EXPL: 4

Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument. Desbordamiento de búfer basado en pila en el método BrowseAndSaveFile en el control ActiveX ConsoleUtilities v6.0.0.1846 en AeXNSConsoleUtilities.dll en Symantec Altiris Notification Server (NS) v6.0 anterior a R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution v6.9 SP3, y Symantec Management Platform (SMP) v7.0 anterior a SP3, permite a atacantes remotos ejecutar código de su elección a través de una cadena larga en el segundo argumento. • https://www.exploit-db.com/exploits/9853 https://www.exploit-db.com/exploits/16613 http://sotiriu.de/adv/NSOADV-2009-001.txt http://www.securityfocus.com/archive/1/507625/100/0/threaded http://www.securityfocus.com/bid/36698 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00 http://www.vupen.com/english/advisories/2009/3117 https://kb.altiris.com/article.asp?article=49389&p=1 https://kb& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

The ListView control in the Client GUI (AClient.exe) in Symantec Altiris Deployment Solution 6.x before 6.9.355 SP1 allows local users to gain SYSTEM privileges and execute arbitrary commands via a "Shatter" style attack on the "command prompt" hidden GUI button to (1) overwrite the CommandLine parameter to cmd.exe to use SYSTEM privileges and (2) modify the DLL that is loaded using the LoadLibrary API function. El control "ListView" (vista de lista) del cliente de interfaz gráfico (AClient.exe) en Altiris Deployment Solution v6.x anterior a 6.9.355 SP1 de Symantec permite a usuarios locales obtener privilegios de SYSTEM y ejecutar comandos de su elección a través un tipo de ataque "Shatter" en el botón oculto del interfaz gráfico "command prompt" para (1) sobreescribir el parámetro CommandLine a cmd.exe para usar privilegios de SYSTEM y (2) modificar la DLL que es cargada usando la función de la API LoadLibrary. • https://github.com/alt3kx/CVE-2008-6827 http://marc.info/?l=bugtraq&m=122460544316205&w=2 http://osvdb.org/49426 http://secunia.com/advisories/31773 http://www.insomniasec.com/advisories/ISVA-081020.1.htm http://www.securityfocus.com/bid/31766 http://www.securitytracker.com/id?1021071 http://www.symantec.com/avcenter/security/Content/2008.10.20a.html http://www.vupen.com/english/advisories/2008/2876 https://exchange.xforce.ibmcloud.com/vulnerabilities/46006 • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Symantec Altiris Deployment Solution 6.x before 6.9.355 SP1 stores the Application Identity Account password in memory in cleartext, which allows local users to gain privileges and modify clients of the Deployment Solution Server. Altiris Deployment Solution v6.x anterior a 6.9.355 SP1 de Symantec almacena la contraseña de "Application Identity Account" (cuenta de identidad de aplicación) en texto claro, lo que permite a usuarios locales obtener privilegios y modificar clientes de "Deployment Solution Server". • http://secunia.com/advisories/31773 http://securityresponse.symantec.com/avcenter/security/Content/2008.10.20b.html http://www.securityfocus.com/bid/31767 http://www.securitytracker.com/id?1021072 http://www.vupen.com/english/advisories/2008/2876 https://exchange.xforce.ibmcloud.com/vulnerabilities/46007 • CWE-312: Cleartext Storage of Sensitive Information •