CVE-2008-3703
Symantec Veritas Storage Foundation Scheduler Service NULL Session Authentication Bypass Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The management console in the Volume Manager Scheduler Service (aka VxSchedService.exe) in Symantec Veritas Storage Foundation for Windows (SFW) 5.0, 5.0 RP1a, and 5.1 accepts NULL NTLMSSP authentication, which allows remote attackers to execute arbitrary code via requests to the service socket that create "snapshots schedules" registry values specifying future command execution. NOTE: this issue exists because of an incomplete fix for CVE-2007-2279.
La consola de gestión en Volume Manager Scheduler Service (también conocido como VxSchedService.exe) de Symantec Veritas Storage Foundation para Windows (SFW) 5.0, 5.0 RP1a y 5.1 acepta autentificación NULL NTLMSSP, lo que permite a atacantes remotos ejecutar código de su elección mediante peticiones al socket del servicio que crea valores del registro de "snapshots schedules (horarios de ficheros de captura)" especificando la ejecución de comandos futuros. NOTA: este problema existe debido a una solución incompleta de CVE-2007-2279.
This vulnerability allows an attacker to execute arbitrary code on vulnerable installations of Symantec Veritas Storage Foundation. User interaction is not required to exploit this vulnerability. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the functionality exposed by the Storage Foundation for Windows Scheduler Service, VxSchedService.exe, which listens by default on TCP port 4888. The management console allows NULL NTLMSSP authentication thereby enabling a remote attacker to add, modify, or delete snapshots schedules and consequently run arbitrary code under the context of the SYSTEM user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-08-14 CVE Published
- 2008-08-18 CVE Reserved
- 2024-08-07 CVE Updated
- 2024-09-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/4161 | Third Party Advisory | |
http://securitytracker.com/id?1020699 | Vdb Entry | |
http://www.securityfocus.com/archive/1/495481 | Mailing List | |
http://www.securityfocus.com/archive/1/495487/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/30596 | Vdb Entry | |
http://www.symantec.com/avcenter/security/Content/2008.08.14a.html | X_refsource_confirm | |
http://www.vupen.com/english/advisories/2008/2395 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-08-053 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44466 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://seer.entsupport.symantec.com/docs/306386.htm | 2018-10-11 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/31486 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Symantec Search vendor "Symantec" | Veritas Storage Foundation Search vendor "Symantec" for product "Veritas Storage Foundation" | 5.0 Search vendor "Symantec" for product "Veritas Storage Foundation" and version "5.0" | windows |
Affected
| ||||||
Symantec Search vendor "Symantec" | Veritas Storage Foundation Search vendor "Symantec" for product "Veritas Storage Foundation" | 5.0 Search vendor "Symantec" for product "Veritas Storage Foundation" and version "5.0" | rp1a, windows |
Affected
| ||||||
Symantec Search vendor "Symantec" | Veritas Storage Foundation Search vendor "Symantec" for product "Veritas Storage Foundation" | 5.1 Search vendor "Symantec" for product "Veritas Storage Foundation" and version "5.1" | windows |
Affected
|