3 results (0.007 seconds)

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

GEAR Software CD DVD Filter driver (aka GEARAspiWDM.sys), as used in Symantec Backup Exec System Recovery 8.5 and BESR 2010, Symantec System Recovery 2011, Norton 360, and Norton Ghost, allows local users to cause a denial of service (system crash) via unspecified vectors. GEAR Software CD DVD Filter driver (también conocido como GEARAspiWDM.sys), tal y como se usa en Symantec Backup Exec System Recovery 8.5 y BESR 2010, Symantec System Recovery 2011, Norton 360 y Norton Ghost, permite que los usuarios locales provoquen una denegación de servicio (cierre inesperado del sistema) mediante vectores no especificados. • http://www.securityfocus.com/bid/47822 https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20111109_00 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

Multiple unspecified vulnerabilities in FileBackup.DLL in Symantec Norton Ghost 12.0 allow remote attackers to cause a denial of service via unspecified vectors involving the UpdateCatalog and other functions. Múltiples vulnerabilidades no especificadas en FileBackup.DLL de Symantec Norton Ghost 12.0 permite a atacantes remotos provocar una denegación de servicio mediante vectores no especificados que implican a UpdateCatalog y otras funciones. • http://osvdb.org/45802 http://www.eleytt.com/advisories/eleytt_GHOST1.pdf http://www.securityfocus.com/archive/1/473187 http://www.securityfocus.com/archive/1/473212 http://www.securityfocus.com/bid/24826 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Buffer overflow in RemoteCommand.DLL in Symantec Norton Ghost 12.0 allows remote attackers to execute arbitrary code via the Connect function. Desbordamiento de búfer en RemoteCommand.DLL de Symantec Norton Ghost 12.0 permite a atacantes remotos ejecutar código de su elección a través de la función Connect. • http://osvdb.org/43961 http://www.eleytt.com/advisories/eleytt_GHOST2.pdf http://www.securityfocus.com/archive/1/473187 http://www.securityfocus.com/archive/1/473212 http://www.securityfocus.com/bid/24825 •