Описание
Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Symantec Veritas Storage Foundation 5.0 allows remote attackers to execute arbitrary code via a packet with a crafted value of a certain size field, which is not checked for consistency with the actual buffer size.
Ссылки
- Patch
- Patch
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:symantec:veritas_storage_foundation:5.0:*:aix:*:*:*:*:*
cpe:2.3:a:symantec:veritas_storage_foundation:5.0:*:hp_ux:*:*:*:*:*
cpe:2.3:a:symantec:veritas_storage_foundation:5.0:*:linux:*:*:*:*:*
cpe:2.3:a:symantec:veritas_storage_foundation:5.0:*:solaris:*:*:*:*:*
cpe:2.3:a:symantec:veritas_storage_foundation:5.0:*:windows_2000:*:*:*:*:*
cpe:2.3:a:symantec:veritas_storage_foundation:5.0:32bit:windows_2003:*:*:*:*:*
cpe:2.3:a:symantec:veritas_storage_foundation:5.0:64bit:windows_2003:*:*:*:*:*
EPSS
Процентиль: 95%
0.20169
Средний
9.3 Critical
CVSS2
Дефекты
CWE-119
Связанные уязвимости
github
почти 4 года назад
Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Symantec Veritas Storage Foundation 5.0 allows remote attackers to execute arbitrary code via a packet with a crafted value of a certain size field, which is not checked for consistency with the actual buffer size.
EPSS
Процентиль: 95%
0.20169
Средний
9.3 Critical
CVSS2
Дефекты
CWE-119