The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Windows 5.0 allows remote attackers to bypass authentication and execute arbitrary code via certain requests to the service socket that create (1) PreScript or (2) PostScript registry values under Veritas\VxSvc\CurrentVersion\Schedules specifying future command execution.
https://exchange.xforce.ibmcloud.com/vulnerabilities/34680
http://www.vupen.com/english/advisories/2007/2035
http://www.symantec.com/avcenter/security/Content/2007.06.01.html
http://www.securitytracker.com/id?1018188
http://www.securityfocus.com/bid/24194
http://www.securityfocus.com/archive/1/470562/100/0/threaded
http://seer.entsupport.symantec.com/docs/288627.htm