|
|||
Rule General Information |
---|
Release Date: | 2020-07-07 | |
Rule Name: | Symantec Alert Management System Intel Alert Originator Service Buffer Overflow Vulnerability -2 (CVE-2009-1430) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows | |
Reference: | SecurityFocusBID:34672 SecurityFocusBID:34674 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://www.symantec.com |