// For flags

CVE-2007-6016

Symantec BackupExec Calendar Control - 'PVCalendar.ocx' Remote Buffer Overflow

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple stack-based buffer overflows in the PVATLCalendar.PVCalendar.1 ActiveX control in pvcalendar.ocx in the scheduler component in the Media Server in Symantec Backup Exec for Windows Server (BEWS) 11d 11.0.6235 and 11.0.7170, and 12.0 12.0.1364, allow remote attackers to execute arbitrary code via a long (1) _DOWText0, (2) _DOWText1, (3) _DOWText2, (4) _DOWText3, (5) _DOWText4, (6) _DOWText5, (7) _DOWText6, (8) _MonthText0, (9) _MonthText1, (10) _MonthText2, (11) _MonthText3, (12) _MonthText4, (13) _MonthText5, (14) _MonthText6, (15) _MonthText7, (16) _MonthText8, (17) _MonthText9, (18) _MonthText10, or (19) _MonthText11 property value when executing the Save method. NOTE: the vendor states "Authenticated user involvement required," but authentication is not needed to attack a client machine that loads this control.

Múltiples desbordamientos de búfer en el control ActiveX PVATLCalendar.PVCalendar.1 en el archivo pvcalendar.ocx en el componente scheduler en el Servidor Multimedia en Symantec Backup Exec for Windows Server (BEWS) versiones 11d 11.0.6235 y 11.0.7170, y versiones 12.0 12.0.1364, permite a atacantes remotos ejecutar código arbitrario por medio de un valor de propiedad largo (1) _DOWText0, (2) _DOWText1, (3) _DOWText2, (4) _DOWText3, (5) _DOWText4, (6) _DOWText5, (7) _DOWText6, (8) _MonthText0, (9) _MonthText1, (10) _MonthText2, (11) _TextoMes3, (12) _TextoMes4, (13) _TextoMes5, (14) _TextoMes6, (15) _TextoMes7, (16) _TextoMes8, (17) _TextoMes9, (18) _TextoMes10, o (19) _TextoMes11, cuando se ejecuta el método Save. NOTA: el proveedor declara "Authenticated user involvement required," pero la autenticación no es necesaria para atacar una máquina cliente que carga este control.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-11-19 CVE Reserved
  • 2008-02-29 CVE Published
  • 2010-05-09 First Exploit
  • 2024-08-07 CVE Updated
  • 2024-09-10 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Symantec
Search vendor "Symantec"
Backup Exec For Windows Server
Search vendor "Symantec" for product "Backup Exec For Windows Server"
11d
Search vendor "Symantec" for product "Backup Exec For Windows Server" and version "11d"
11.0.6235
Affected
Symantec
Search vendor "Symantec"
Backup Exec For Windows Server
Search vendor "Symantec" for product "Backup Exec For Windows Server"
11d
Search vendor "Symantec" for product "Backup Exec For Windows Server" and version "11d"
11.0.7170
Affected
Symantec
Search vendor "Symantec"
Backup Exec For Windows Server
Search vendor "Symantec" for product "Backup Exec For Windows Server"
12.0
Search vendor "Symantec" for product "Backup Exec For Windows Server" and version "12.0"
12.0.1364
Affected