6 results (0.009 seconds)

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 0

The web console in Symantec Altiris Notification Server 6.0.x before 6.0 SP3 R12 uses a hardcoded key that can decrypt SQL Server credentials and certain discovery credentials, and stores this key on the Notification Server machine, which allows local users to obtain sensitive information and possibly execute arbitrary code by decrypting and using these credentials. La consola web Symantec Altiris Notification Server v6.0.x anterior a v6.0 SP3 R12, usa una clave embebida que puede descifrar las credenciales del servidor SQL y otro tipo de credenciales. Almacena esta clave en la máquina Notification Server, lo que permite a usuarios locales obtener información sensible y posiblemente, ejecutar código de su elección a través de estas credenciales. • http://osvdb.org/62010 http://secunia.com/advisories/38356 http://www.securityfocus.com/bid/37953 http://www.securitytracker.com/id?1023521 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100128_00 http://www.vupen.com/english/advisories/2010/0256 https://exchange.xforce.ibmcloud.com/vulnerabilities/55952 • CWE-255: Credentials Management Errors •

CVSS: 6.8EPSS: 71%CPEs: 30EXPL: 2

The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method. En Altiris eXpress NS SC la descarga del control ActiveX en AeXNSPkgDLLib.dll, como en Symantec Altiris Deployment Solution v6.9.x, Notification Server v6.0.x, y Symantec Management Platform v7.0.x expone un método inseguro, que permite a atacantes remotos forzar la descarga de archivos arbitrarios y, posiblemente, ejecutar código arbitrario a través del método DownloadAndInstall. • https://www.exploit-db.com/exploits/16600 http://secunia.com/advisories/36679 http://www.osvdb.org/57893 http://www.securityfocus.com/bid/36346 http://www.symantec.com/business/support/index?page=content&id=TECH44885 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090922_00 •

CVSS: 9.3EPSS: 96%CPEs: 16EXPL: 2

Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument. Desbordamiento de búfer en el método RunCmd en Altiris eXpress NS Console Utilities ActiveX control en AeXNSConsoleUtilities.dll en la consola web de Symantec Altiris Deployment Solution v6.9.x, Altiris Notification Server v6.0.x, y Management Platform v7.0.x permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga en el segundo argumento. • https://www.exploit-db.com/exploits/16528 http://osvdb.org/60496 http://www.securityfocus.com/bid/37092 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091124_00 http://www.vupen.com/english/advisories/2009/3328 https://exchange.xforce.ibmcloud.com/vulnerabilities/54415 https://kb.altiris.com/article.asp?article=50072&p=1 https://kb.altiris.com/article.asp?article=50279&p=1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 95%CPEs: 13EXPL: 4

Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument. Desbordamiento de búfer basado en pila en el método BrowseAndSaveFile en el control ActiveX ConsoleUtilities v6.0.0.1846 en AeXNSConsoleUtilities.dll en Symantec Altiris Notification Server (NS) v6.0 anterior a R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution v6.9 SP3, y Symantec Management Platform (SMP) v7.0 anterior a SP3, permite a atacantes remotos ejecutar código de su elección a través de una cadena larga en el segundo argumento. • https://www.exploit-db.com/exploits/9853 https://www.exploit-db.com/exploits/16613 http://sotiriu.de/adv/NSOADV-2009-001.txt http://www.securityfocus.com/archive/1/507625/100/0/threaded http://www.securityfocus.com/bid/36698 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00 http://www.vupen.com/english/advisories/2009/3117 https://kb.altiris.com/article.asp?article=49389&p=1 https://kb& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 0%CPEs: 5EXPL: 0

Unspecified vulnerability in the GUI in Symantec Altiris Notification Server Agent 6.x before 6.0 SP3 R8 allows local users to gain privileges via unknown attack vectors. Vulnerabilidad no especificada en el GUI de Symantec Altiris Notification Server Agent versiones 6.x anteriores a 6.0 SP3 R8 permite a usuarios locales obtener mayores privilegios mediante vectores de ataque desconocidos. • http://secunia.com/advisories/30741 http://securityresponse.symantec.com/avcenter/security/Content/2008.06.17.html http://www.securityfocus.com/bid/29708 http://www.securitytracker.com/id?1020304 http://www.vupen.com/english/advisories/2008/1861/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43154 • CWE-264: Permissions, Privileges, and Access Controls •