CVE-2009-1430

high

Description

Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/50178

https://exchange.xforce.ibmcloud.com/vulnerabilities/50177

http://www.zerodayinitiative.com/advisories/ZDI-09-018/

http://www.vupen.com/english/advisories/2009/1204

http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02

http://www.securitytracker.com/id?1022132

http://www.securitytracker.com/id?1022131

http://www.securitytracker.com/id?1022130

http://www.securityfocus.com/bid/34674

http://www.securityfocus.com/bid/34672

http://www.securityfocus.com/archive/1/503080/100/0/threaded

http://secunia.com/advisories/34856

Details

Source: Mitre, NVD

Published: 2009-04-29

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.4

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: High