Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   Symantec Anti Virus Vendors:   Symantec
Symantec Antivirus Corporate Edition Intel AMS Service Lets Remote Users Deny Service and Execute Programs
SecurityTracker Alert ID:  1024997
SecurityTracker URL:
CVE Reference:   CVE-2010-0111   (Links to External Site)
Date:  Jan 28 2011
Impact:   Denial of service via network, Execution of arbitrary code via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.x prior to 10.1 MR10
Description:   A vulnerability was reported in Symantec AntiVirus Corporate Edition. A remote user can cause denial of service conditions. A remote user can execute programs on the target user's system.

A remote user can send specially crafted data to the Intel Alert Management System service on TCP port 38292 to cause the target service to shutdown. It may be possible to execute arbitrary programs on the target user's system.

The vulnerability resides in the third party Intel Alert Management System (AMS2).

Symantec Systems Center and Symantec Quarantine Server are also affected.

An anonymous researcher (via TippingPoint), Junaid Bohio of Vulnerability Research Team, Telus Security Labs, and Nahuel Riva of Core Security Technologies reported this vulnerability.

Impact:   A remote user can cause the target service to shutdown.

A remote user can execute programs on the target user's system.

Solution:   The vendor has issued a fix (SAVCE 10.1 MR10).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC