6 results (0.015 seconds)

CVSS: 9.3EPSS: 18%CPEs: 168EXPL: 0

Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives. Desbordamiento de búfer basado en pila en el componente Decomposer en múltiples producto Symantec que permiten a atacantes remotos ejecutar código de su elección a través de archivos .CAB manipulados. This vulnerability allows remote attackers to execute arbitrary code on systems with affected installations of Symantec's AntiVirus Engine. User interaction is not required to exploit this vulnerability. The specific flaw exists during the process of scanning multiple maliciously formatted CAB archives. The parsing routine implicitly trusts certain user-supplied values that can result in an exploitable heap corruption. • http://osvdb.org/36118 http://secunia.com/advisories/26053 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html http://www.securityfocus.com/bid/24282 http://www.vupen.com/english/advisories/2007/2508 http://www.zerodayinitiative.com/advisories/ZDI-07-040.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 15%CPEs: 168EXPL: 0

The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header. El componente Decomposer en múltiples productos Symantec permite a atacantes remotos provocar denegación de servicio (bucles infinitos) a través de ciertos valores en el campo PACK_SIZE de una cabecera de archivo RAR. This vulnerability allows attackers to create a denial of service condition on software with vulnerable installations of the Symantec's AntiVirus engine. Authentication is not required to exploit this vulnerability. The specific flaw resides in a forged PACK_SIZE field of a RAR file header. By setting this field to a specific value an infinite loop denial of service condition will occur when the scanner processes the file. • http://osvdb.org/36119 http://secunia.com/advisories/26053 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html http://www.securityfocus.com/bid/24282 http://www.vupen.com/english/advisories/2007/2508 http://www.zerodayinitiative.com/advisories/ZDI-07-039.html •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Symantec Brightmail AntiSpam (SBAS) before 6.0.4, when the Control Center is allowed to connect from any computer, allows remote attackers to cause a denial of service (application freeze) "by sending invalid posts". Symantec Brightmail AntiSpam (SBAS) anterior a 6.0.4, cuando está permitido conectarse al Centro de Control desde cualquier ordenador, permite a atacantes remotos provocar una denegación de servicio (congelación de la aplicación) enviando peticiones inválidas. • http://secunia.com/advisories/21223 http://securityresponse.symantec.com/avcenter/security/Content/2006.07.27.html http://securitytracker.com/id?1016600 http://www.securityfocus.com/bid/19182 http://www.vupen.com/english/advisories/2006/3018 •

CVSS: 7.6EPSS: 21%CPEs: 4EXPL: 0

Multiple directory traversal vulnerabilities in Symantec Brightmail AntiSpam (SBAS) before 6.0.4, when the Control Center is allowed to connect from any computer, allow remote attackers to read and overwrite certain files via directory traversal sequences in (1) DATABLOB-GET and (2) DATABLOB-SAVE requests. Múltiples vulnerabilidades de salto de directorio en Symantec Brightmail AntiSpam (SBAS) anterior a 6.0.4, cuando está permitido conectarse al Centro de Control desde cualquier ordenador, permite a atacantes remotos leer y sobrescribir ciertos ficheros mediante secuencias de salto de directorio en peticiones DATABLOB-GET y (2) DATABLOB-SAVE. • http://secunia.com/advisories/21223 http://securityresponse.symantec.com/avcenter/security/Content/2006.07.27.html http://securitytracker.com/id?1016600 http://www.osvdb.org/27589 http://www.osvdb.org/27590 http://www.securityfocus.com/bid/19182 http://www.vupen.com/english/advisories/2006/3018 https://exchange.xforce.ibmcloud.com/vulnerabilities/28058 https://exchange.xforce.ibmcloud.com/vulnerabilities/28059 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Symantec Brightmail AntiSpam before 6.0.2 has a hard-coded database administrator password, which allows remote attackers to gain privileges. • http://secunia.com/advisories/15562 http://securityresponse.symantec.com/avcenter/security/Content/2005.05.31a.html http://securitytracker.com/id?1014088 http://www.vupen.com/english/advisories/2005/0671 https://exchange.xforce.ibmcloud.com/vulnerabilities/20804 •