Search criteria

3 vulnerabilities found for veritas_storage_foundation_for_windows_high_availability by symantec

FKIE_CVE-2009-3027

Vulnerability from fkie_nvd - Published: 2009-12-11 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=126046186917330&w=2Patch
cve@mitre.orghttp://secunia.com/advisories/37631Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/37637Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/37685Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1023309
cve@mitre.orghttp://securitytracker.com/id?1023312
cve@mitre.orghttp://seer.entsupport.symantec.com/docs/336988.htmPatch, Vendor Advisory
cve@mitre.orghttp://seer.entsupport.symantec.com/docs/337279.htmPatch, Vendor Advisory
cve@mitre.orghttp://seer.entsupport.symantec.com/docs/337293.htmPatch, Vendor Advisory
cve@mitre.orghttp://seer.entsupport.symantec.com/docs/337392.htmPatch, Vendor Advisory
cve@mitre.orghttp://seer.entsupport.symantec.com/docs/337859.htmPatch, Vendor Advisory
cve@mitre.orghttp://seer.entsupport.symantec.com/docs/337930.htmPatch, Vendor Advisory
cve@mitre.orghttp://www.osvdb.org/60884
cve@mitre.orghttp://www.securityfocus.com/archive/1/508358/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/37012
cve@mitre.orghttp://www.securitytracker.com/id?1023311
cve@mitre.orghttp://www.securitytracker.com/id?1023313
cve@mitre.orghttp://www.securitytracker.com/id?1023318
cve@mitre.orghttp://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091209_00
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/3467Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/3483Vendor Advisory
cve@mitre.orghttp://www.zerodayinitiative.com/advisories/ZDI-09-098/Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/54665
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=126046186917330&w=2Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37631Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37637Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37685Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1023309
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1023312
af854a3a-2127-422b-91ae-364da2661108http://seer.entsupport.symantec.com/docs/336988.htmPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://seer.entsupport.symantec.com/docs/337279.htmPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://seer.entsupport.symantec.com/docs/337293.htmPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://seer.entsupport.symantec.com/docs/337392.htmPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://seer.entsupport.symantec.com/docs/337859.htmPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://seer.entsupport.symantec.com/docs/337930.htmPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/60884
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/508358/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/37012
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1023311
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1023313
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1023318
af854a3a-2127-422b-91ae-364da2661108http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091209_00
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3467Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3483Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.zerodayinitiative.com/advisories/ZDI-09-098/Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/54665
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986
Impacted products
Vendor Product Version
symantec backup_exec_continuous_protection_server 11d
symantec backup_exec_continuous_protection_server 12.0
symantec backup_exec_continuous_protection_server 12.5
symantec veritas_application_director 1.1
symantec veritas_application_director 1.1
symantec veritas_backup_exec 11d
symantec veritas_backup_exec 12.0
symantec veritas_backup_exec 12.5
symantec veritas_cluster_server 3.5
symantec veritas_cluster_server 4.0
symantec veritas_cluster_server 4.0
symantec veritas_cluster_server 4.1
symantec veritas_cluster_server 4.1
symantec veritas_cluster_server 4.1
symantec veritas_cluster_server 5.0
symantec veritas_cluster_server 5.0
symantec veritas_cluster_server 5.0
symantec veritas_cluster_server 5.0
symantec veritas_cluster_server_management_console 5.1
symantec veritas_cluster_server_management_console 5.5
symantec veritas_cluster_server_management_console 5.5.1
symantec veritas_cluster_server_one 2.0
symantec veritas_cluster_server_one 2.0.1
symantec veritas_cluster_server_one 2.0.2
symantec veritas_command_central_enterprise_reporter 5.0_ga
symantec veritas_command_central_enterprise_reporter 5.0mp1
symantec veritas_command_central_enterprise_reporter 5.0mp1rp1
symantec veritas_command_central_enterprise_reporter 5.1
symantec veritas_command_central_storage 4.x
symantec veritas_command_central_storage 5.0
symantec veritas_command_central_storage 5.1
symantec veritas_command_central_storage_change_manager 5.0
symantec veritas_command_central_storage_change_manager 5.1
symantec veritas_micromeasure 5.0
symantec veritas_netbackup_operations_manager 6.0_ga
symantec veritas_netbackup_operations_manager 6.5.5
symantec veritas_netbackup_reporter 6.0_ga
symantec veritas_netbackup_reporter 6.6
symantec veritas_storae_foundation 3.5_onwards
symantec veritas_storage_foundation 3.5
symantec veritas_storage_foundation_cluster_file_system 3.5
symantec veritas_storage_foundation_cluster_file_system 4.0
symantec veritas_storage_foundation_cluster_file_system 4.0
symantec veritas_storage_foundation_cluster_file_system 4.0
symantec veritas_storage_foundation_cluster_file_system 4.0
symantec veritas_storage_foundation_cluster_file_system 4.1
symantec veritas_storage_foundation_cluster_file_system 4.1
symantec veritas_storage_foundation_cluster_file_system 4.1
symantec veritas_storage_foundation_cluster_file_system 4.1
symantec veritas_storage_foundation_cluster_file_system 5.0
symantec veritas_storage_foundation_cluster_file_system 5.0
symantec veritas_storage_foundation_cluster_file_system 5.0
symantec veritas_storage_foundation_cluster_file_system 5.0
symantec veritas_storage_foundation_cluster_file_system_for_oracle_rac 5.0
symantec veritas_storage_foundation_for_db2 4.1
symantec veritas_storage_foundation_for_db2 4.1
symantec veritas_storage_foundation_for_db2 5.0
symantec veritas_storage_foundation_for_db2 5.0
symantec veritas_storage_foundation_for_db2 5.0
symantec veritas_storage_foundation_for_high_availability 3.5
symantec veritas_storage_foundation_for_oracle 4.1
symantec veritas_storage_foundation_for_oracle 5.0
symantec veritas_storage_foundation_for_oracle 5.0.1
symantec veritas_storage_foundation_for_oracle_real_application_cluster 3.5
symantec veritas_storage_foundation_for_oracle_real_application_cluster 4.0
symantec veritas_storage_foundation_for_oracle_real_application_cluster 4.0
symantec veritas_storage_foundation_for_oracle_real_application_cluster 4.1
symantec veritas_storage_foundation_for_oracle_real_application_cluster 4.1
symantec veritas_storage_foundation_for_oracle_real_application_cluster 4.1
symantec veritas_storage_foundation_for_oracle_real_application_cluster 5.0
symantec veritas_storage_foundation_for_oracle_real_application_cluster 5.0
symantec veritas_storage_foundation_for_oracle_real_application_cluster 5.0
symantec veritas_storage_foundation_for_oracle_real_application_cluster 5.0
symantec veritas_storage_foundation_for_oracle_real_application_cluster 5.0
symantec veritas_storage_foundation_for_sybase 4.1
symantec veritas_storage_foundation_for_sybase 5.0
symantec veritas_storage_foundation_for_windows_high_availability 4.3mp2
symantec veritas_storage_foundation_for_windows_high_availability 5.0
symantec veritas_storage_foundation_for_windows_high_availability 5.0rp1a
symantec veritas_storage_foundation_for_windows_high_availability 5.0rp2
symantec veritas_storage_foundation_for_windows_high_availability 5.1
symantec veritas_storage_foundation_for_windows_high_availability 5.1ap1
symantec veritas_storage_foundation_manager 1.0
symantec veritas_storage_foundation_manager 1.0mp1
symantec veritas_storage_foundation_manager 1.1
symantec veritas_storage_foundation_manager 1.1.1ux
symantec veritas_storage_foundation_manager 1.1.1win
symantec veritas_storage_foundation_manager 2.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec:backup_exec_continuous_protection_server:11d:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E6E4ABB-057E-42D3-8A89-5D456675EC69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:backup_exec_continuous_protection_server:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D740C486-FBFB-40C3-9984-FDDEC5EA9733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:backup_exec_continuous_protection_server:12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6ACB3C3-C9C4-4E9C-A844-D666A967A234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_application_director:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "942E06E0-9D27-4CDD-B633-08C327ED1EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_application_director:1.1:*:platform_expansion:*:*:*:*:*",
              "matchCriteriaId": "A9BC62A6-4624-4590-B9C8-0CA16185831C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_backup_exec:11d:*:*:*:*:*:*:*",
              "matchCriteriaId": "012C76D4-E77B-4468-A24A-A492A412CE7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_backup_exec:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA48FE77-E46D-4F12-9124-01165D223CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_backup_exec:12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "75D16DC0-92CC-4FAE-8640-4845F6338CB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server:3.5:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "7B54B477-85EC-4435-BA22-6586DE493097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server:4.0:*:aix:*:*:*:*:*",
              "matchCriteriaId": "B0ED4E24-038C-45DA-8023-233F0A0800F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server:4.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "37BB09D0-0FD3-41E5-8BE0-890F84B98C89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server:4.1:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "D0AACBB1-8F69-4F63-974B-C64E78686438",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server:4.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "A9EDF286-222D-460B-9591-DB99323BAF46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server:4.1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "AB282C2B-C0C5-40CC-9E16-B5B8271AC222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:aix:*:*:*:*:*",
              "matchCriteriaId": "A7B74077-2547-4F27-BD57-359491435F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "6B271A01-4E72-41DC-A0E6-3F070A7F613C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "F586E834-013A-434C-90A1-715B2B15C12D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "E89EEBDC-F160-4AB0-80CF-49E5655F04E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server_management_console:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1470C394-3B0A-4322-9ACC-A3586527529A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server_management_console:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F33C5F-0150-4CA3-94C3-5A84D7715516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server_management_console:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0886CD94-42FE-4140-86E7-F4C9939A290F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server_one:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F7A5C-3944-4DC3-96A6-627B133FA006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server_one:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDB0D6A1-D2D1-4F60-B366-52715D30D26B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_cluster_server_one:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "52D62C7A-3C39-4321-B9E1-49E300EEC494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.0_ga:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C7C1181-1A78-4774-B016-8D6D5F0C30E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.0mp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C07F0CC-72FC-4D3F-90AC-D82472422706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.0mp1rp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FE2945-5381-4445-A064-C9E20B4F643A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B30722B-AA42-4B49-BD87-B518C970C921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_command_central_storage:4.x:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F98C53-8712-4FF6-B168-50F25555CE0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_command_central_storage:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C33D910F-1116-4432-970B-CD0949CB8DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_command_central_storage:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC235D3-E8CF-44EE-9C6F-CEE85BA239A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_command_central_storage_change_manager:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "276B6BB8-6E10-4D7C-984D-C9DEC4A93400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_command_central_storage_change_manager:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C2160A2-D8E6-420B-8E3F-90B6501ADCB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_micromeasure:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD78EF3-8890-43CB-B56A-6EF18B76E48B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_netbackup_operations_manager:6.0_ga:*:*:*:*:*:*:*",
              "matchCriteriaId": "817AF93A-7BB1-4295-AD5E-67B697DE066F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_netbackup_operations_manager:6.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D79923BD-6346-409B-A326-BDD024D64EA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_netbackup_reporter:6.0_ga:*:*:*:*:*:*:*",
              "matchCriteriaId": "370F7991-4133-4A4A-AF24-232323D0CED6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_netbackup_reporter:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "024C614A-094B-401B-BF41-9D6071102099",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storae_foundation:3.5_onwards:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF7C58A-F135-49FE-A507-B46D9FA51232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE415ED-224D-4806-92BB-BEFDE2D645D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:3.5:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "A11DA8A4-DBA8-4F38-9CAC-27BCDD031F44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:aix:*:*:*:*:*",
              "matchCriteriaId": "C7420624-84D9-4A86-A027-6CB288D4B43A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "D6652DB1-FDD6-48A4-9517-D981873C4EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "1C96E3F4-F895-41A9-ADA0-97CAEF73AB52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "601EC43E-7B41-4BE8-B45B-F33C5B9F9620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:aix:*:*:*:*:*",
              "matchCriteriaId": "B6C3BEA8-8B10-48AC-BB94-F11E5361315B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "7A2C5349-8569-4884-A8F6-775DAC771D9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "68999D92-BF01-48D8-8B1D-078629875F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "E274ECF5-98F2-40D7-8166-63142D0A57F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:aix:*:*:*:*:*",
              "matchCriteriaId": "A4A976D0-6487-49D4-8556-0DD60021A0CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "8EC6BF09-81D7-4882-BA29-8A311BB673FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "F5464913-8A56-4031-93DE-A70F159FF7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "06715E62-1C94-4345-8AA9-D67BB7EB8F5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system_for_oracle_rac:5.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "D8722C95-F712-4F2A-ACCF-CEA3BEDCCD29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:4.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "431F59D5-D26E-4EC9-BABF-E08627D96055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:4.1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "534552BF-CEF1-45B3-B532-CAD4300F61F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:5.0:*:aix:*:*:*:*:*",
              "matchCriteriaId": "E047AD78-DE53-4555-B7C2-9FF95EE3D793",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:5.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "47781640-9536-4107-BF63-80104F947F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:5.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "A1BE7CE6-7DF3-4C9E-AB4B-3F3534AB6E8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_high_availability:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "08EF077E-57CB-4995-B465-1DB9DF2B0C34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1434B93C-2D93-400E-99E2-95D210771C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F05F046-9B3F-4753-9B94-24906717528B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "34053749-395D-48E2-BE02-4784E2D1F934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:3.5:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "C757098D-F666-45F6-B0F8-164170BCED8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.0:*:aix:*:*:*:*:*",
              "matchCriteriaId": "BDE6CD95-FC16-4E12-A852-6F06D3EEA5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "16F884A4-E0B6-4857-BD61-4B69DA0CF783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "F9496201-BE01-4FFC-A6B9-AED5E8F8C8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "36B7EF96-CA33-48CF-B6D3-607970BB85DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.1:hp-ux:*:*:*:*:*:*",
              "matchCriteriaId": "2AA0E4E6-AB87-43D7-BEB9-46B34B5BEDFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F339DCEF-1F4F-4C9C-A68D-CA8A5347AD3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:aix:*:*:*:*:*",
              "matchCriteriaId": "51CCB494-8E39-445C-A9B4-87F1BA42B49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:hp-ux:*:*:*:*:*",
              "matchCriteriaId": "DC2A2F53-7488-4339-B7BE-39CB451CEA07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "2405C7B6-E302-4C56-A4B3-85EE70CE8553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "D8726E54-2C92-47E2-82E4-AF987B62C4E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_sybase:4.1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "93186DB0-83C2-45F7-B3D9-129109336C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_sybase:5.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "A0A3C285-6FE5-4365-99A9-E8A7689CCBFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:4.3mp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9436C35-7427-40CB-9CAF-4CF0D6BE3DB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6555A3-5156-42C6-94F7-7B37F7718AA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.0rp1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "55A7A3C7-A461-4838-AA8B-5E4B80E15CF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.0rp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B59E2A5-6066-4CEA-A22D-AEA52FDD1419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC35DF8B-6C75-4EAF-B4A4-3C8E5B4CF968",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.1ap1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A07A7773-F8FE-48CA-9CEE-78835E2EF420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE49ED8-BBDE-4B2A-AF89-8C9467232AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.0mp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB5D0102-15CF-4B99-BA91-5BA852512120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E693F59B-0AA7-413E-B583-E3AD94C18FEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.1.1ux:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA02EC8-9C16-4860-96D1-025576DCD53C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.1.1win:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A9B59DE-9F3B-4AC3-A856-61F66D0531A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation_manager:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D377C9-EE9C-4F93-BA6D-0994F0E23CE0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300."
    },
    {
      "lang": "es",
      "value": "El archivo VRTSweb.exe en VRTSweb en Backup Exec Continuous Protection Server de Symantec (CPS) versiones 11d, 12.0 y 12.5; Veritas NetBackup Operations Manager (NOM) versiones 6.0 GA hasta 6.5.5; Veritas Backup Reporter (VBR) versiones 6.0 GA hasta 6.6; Veritas Storage Foundation (SF) versi\u00f3n 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) versiones 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1 y 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) versi\u00f3n 3.5; Veritas Storage Foundation for Oracle (SFO) versiones 4.1, 5.0 y 5.0.1; Veritas Storage Foundation for DB2 versiones 4.1 y 5.0; Veritas Storage Foundation for Sybase versiones 4.1 y 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) versiones 3.5, 4.0, 4.1 y 5.0; Veritas Storage Foundation Manager (SFM) versiones 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win y 2.0; Veritas Cluster Server (VCS) versiones 3.5, 4.0, 4.1 y 5.0; Veritas Cluster Server One (VCSOne) versiones 2.0, 2.0.1 y 2.0.2; Veritas Application Director (VAD) versiones 1.1 y 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) versiones 5.1, 5.5 y 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) versiones 3.5, 4.0, 4.1 y 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) versi\u00f3n 5.0; Veritas Command Central Storage (CCS) versiones 4.x, 5.0 y 5.1; Veritas Command Central Enterprise Reporter (CC-ER) versiones 5.0 GA, 5.0 MP1, 5.0 MP1RP1 y 5.1; Veritas Command Central Storage Change Manager (CC-SCM) versiones 5.0 y 5.1; y Veritas MicroMeasure versi\u00f3n 5.0, no comprueba apropiadamente las peticiones de autenticaci\u00f3n, que permite a los atacantes remotos desencadenar el desempaquetado de un archivo WAR y ejecutar c\u00f3digo arbitrario en los archivos contenidos, por medio de datos dise\u00f1ados al puerto TCP 14300."
    }
  ],
  "id": "CVE-2009-3027",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-12-11T16:30:00.203",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37631"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37637"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37685"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1023309"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1023312"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/60884"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/37012"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1023311"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1023313"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1023318"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3467"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3483"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37631"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023312"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/60884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/37012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1023311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1023313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1023318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2009-3027 (GCVE-0-2009-3027)

Vulnerability from cvelistv5 – Published: 2009-12-11 16:00 – Updated: 2024-08-07 06:14
VLAI?
Summary
VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=126046186917330&w=2 vendor-advisoryx_refsource_HP
http://seer.entsupport.symantec.com/docs/337930.htm x_refsource_CONFIRM
http://www.zerodayinitiative.com/advisories/ZDI-09-098/ x_refsource_MISC
http://www.vupen.com/english/advisories/2009/3467 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/37637 third-party-advisoryx_refsource_SECUNIA
http://seer.entsupport.symantec.com/docs/337279.htm x_refsource_CONFIRM
http://www.securityfocus.com/bid/37012 vdb-entryx_refsource_BID
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://securitytracker.com/id?1023309 vdb-entryx_refsource_SECTRACK
http://www.osvdb.org/60884 vdb-entryx_refsource_OSVDB
http://marc.info/?l=bugtraq&m=126046186917330&w=2 vendor-advisoryx_refsource_HP
http://seer.entsupport.symantec.com/docs/337859.htm x_refsource_CONFIRM
http://www.securitytracker.com/id?1023318 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/37685 third-party-advisoryx_refsource_SECUNIA
http://seer.entsupport.symantec.com/docs/337392.htm x_refsource_CONFIRM
http://securitytracker.com/id?1023312 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/37631 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3483 vdb-entryx_refsource_VUPEN
http://www.securitytracker.com/id?1023313 vdb-entryx_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/archive/1/508358/100… mailing-listx_refsource_BUGTRAQ
http://www.securitytracker.com/id?1023311 vdb-entryx_refsource_SECTRACK
http://seer.entsupport.symantec.com/docs/337293.htm x_refsource_CONFIRM
http://seer.entsupport.symantec.com/docs/336988.htm x_refsource_CONFIRM
http://www.symantec.com/security_response/securit… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:14:56.480Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SSRT090253",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
          },
          {
            "name": "ADV-2009-3467",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3467"
          },
          {
            "name": "37637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37637"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
          },
          {
            "name": "37012",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37012"
          },
          {
            "name": "oval:org.mitre.oval:def:7986",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
          },
          {
            "name": "1023309",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023309"
          },
          {
            "name": "60884",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/60884"
          },
          {
            "name": "HPSBUX02480",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
          },
          {
            "name": "1023318",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023318"
          },
          {
            "name": "37685",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37685"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
          },
          {
            "name": "1023312",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023312"
          },
          {
            "name": "37631",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37631"
          },
          {
            "name": "ADV-2009-3483",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3483"
          },
          {
            "name": "1023313",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023313"
          },
          {
            "name": "multiple-symantec-vrtsweb-code-execution(54665)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
          },
          {
            "name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
          },
          {
            "name": "1023311",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023311"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SSRT090253",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
        },
        {
          "name": "ADV-2009-3467",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3467"
        },
        {
          "name": "37637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37637"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
        },
        {
          "name": "37012",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37012"
        },
        {
          "name": "oval:org.mitre.oval:def:7986",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
        },
        {
          "name": "1023309",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023309"
        },
        {
          "name": "60884",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/60884"
        },
        {
          "name": "HPSBUX02480",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
        },
        {
          "name": "1023318",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023318"
        },
        {
          "name": "37685",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37685"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
        },
        {
          "name": "1023312",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023312"
        },
        {
          "name": "37631",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37631"
        },
        {
          "name": "ADV-2009-3483",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3483"
        },
        {
          "name": "1023313",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023313"
        },
        {
          "name": "multiple-symantec-vrtsweb-code-execution(54665)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
        },
        {
          "name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
        },
        {
          "name": "1023311",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023311"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3027",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SSRT090253",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337930.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
            },
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
            },
            {
              "name": "ADV-2009-3467",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3467"
            },
            {
              "name": "37637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37637"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337279.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
            },
            {
              "name": "37012",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37012"
            },
            {
              "name": "oval:org.mitre.oval:def:7986",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
            },
            {
              "name": "1023309",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023309"
            },
            {
              "name": "60884",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/60884"
            },
            {
              "name": "HPSBUX02480",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337859.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
            },
            {
              "name": "1023318",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023318"
            },
            {
              "name": "37685",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37685"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337392.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
            },
            {
              "name": "1023312",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023312"
            },
            {
              "name": "37631",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37631"
            },
            {
              "name": "ADV-2009-3483",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3483"
            },
            {
              "name": "1023313",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023313"
            },
            {
              "name": "multiple-symantec-vrtsweb-code-execution(54665)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
            },
            {
              "name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
            },
            {
              "name": "1023311",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023311"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337293.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/336988.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
            },
            {
              "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00",
              "refsource": "CONFIRM",
              "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-3027",
    "datePublished": "2009-12-11T16:00:00",
    "dateReserved": "2009-08-31T00:00:00",
    "dateUpdated": "2024-08-07T06:14:56.480Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-3027 (GCVE-0-2009-3027)

Vulnerability from nvd – Published: 2009-12-11 16:00 – Updated: 2024-08-07 06:14
VLAI?
Summary
VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=126046186917330&w=2 vendor-advisoryx_refsource_HP
http://seer.entsupport.symantec.com/docs/337930.htm x_refsource_CONFIRM
http://www.zerodayinitiative.com/advisories/ZDI-09-098/ x_refsource_MISC
http://www.vupen.com/english/advisories/2009/3467 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/37637 third-party-advisoryx_refsource_SECUNIA
http://seer.entsupport.symantec.com/docs/337279.htm x_refsource_CONFIRM
http://www.securityfocus.com/bid/37012 vdb-entryx_refsource_BID
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://securitytracker.com/id?1023309 vdb-entryx_refsource_SECTRACK
http://www.osvdb.org/60884 vdb-entryx_refsource_OSVDB
http://marc.info/?l=bugtraq&m=126046186917330&w=2 vendor-advisoryx_refsource_HP
http://seer.entsupport.symantec.com/docs/337859.htm x_refsource_CONFIRM
http://www.securitytracker.com/id?1023318 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/37685 third-party-advisoryx_refsource_SECUNIA
http://seer.entsupport.symantec.com/docs/337392.htm x_refsource_CONFIRM
http://securitytracker.com/id?1023312 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/37631 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3483 vdb-entryx_refsource_VUPEN
http://www.securitytracker.com/id?1023313 vdb-entryx_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/archive/1/508358/100… mailing-listx_refsource_BUGTRAQ
http://www.securitytracker.com/id?1023311 vdb-entryx_refsource_SECTRACK
http://seer.entsupport.symantec.com/docs/337293.htm x_refsource_CONFIRM
http://seer.entsupport.symantec.com/docs/336988.htm x_refsource_CONFIRM
http://www.symantec.com/security_response/securit… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:14:56.480Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SSRT090253",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
          },
          {
            "name": "ADV-2009-3467",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3467"
          },
          {
            "name": "37637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37637"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
          },
          {
            "name": "37012",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37012"
          },
          {
            "name": "oval:org.mitre.oval:def:7986",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
          },
          {
            "name": "1023309",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023309"
          },
          {
            "name": "60884",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/60884"
          },
          {
            "name": "HPSBUX02480",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
          },
          {
            "name": "1023318",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023318"
          },
          {
            "name": "37685",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37685"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
          },
          {
            "name": "1023312",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023312"
          },
          {
            "name": "37631",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37631"
          },
          {
            "name": "ADV-2009-3483",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3483"
          },
          {
            "name": "1023313",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023313"
          },
          {
            "name": "multiple-symantec-vrtsweb-code-execution(54665)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
          },
          {
            "name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
          },
          {
            "name": "1023311",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023311"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SSRT090253",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
        },
        {
          "name": "ADV-2009-3467",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3467"
        },
        {
          "name": "37637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37637"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
        },
        {
          "name": "37012",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37012"
        },
        {
          "name": "oval:org.mitre.oval:def:7986",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
        },
        {
          "name": "1023309",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023309"
        },
        {
          "name": "60884",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/60884"
        },
        {
          "name": "HPSBUX02480",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
        },
        {
          "name": "1023318",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023318"
        },
        {
          "name": "37685",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37685"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
        },
        {
          "name": "1023312",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023312"
        },
        {
          "name": "37631",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37631"
        },
        {
          "name": "ADV-2009-3483",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3483"
        },
        {
          "name": "1023313",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023313"
        },
        {
          "name": "multiple-symantec-vrtsweb-code-execution(54665)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
        },
        {
          "name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
        },
        {
          "name": "1023311",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023311"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3027",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SSRT090253",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337930.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
            },
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
            },
            {
              "name": "ADV-2009-3467",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3467"
            },
            {
              "name": "37637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37637"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337279.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
            },
            {
              "name": "37012",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37012"
            },
            {
              "name": "oval:org.mitre.oval:def:7986",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
            },
            {
              "name": "1023309",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023309"
            },
            {
              "name": "60884",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/60884"
            },
            {
              "name": "HPSBUX02480",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337859.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
            },
            {
              "name": "1023318",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023318"
            },
            {
              "name": "37685",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37685"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337392.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
            },
            {
              "name": "1023312",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023312"
            },
            {
              "name": "37631",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37631"
            },
            {
              "name": "ADV-2009-3483",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3483"
            },
            {
              "name": "1023313",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023313"
            },
            {
              "name": "multiple-symantec-vrtsweb-code-execution(54665)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
            },
            {
              "name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
            },
            {
              "name": "1023311",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023311"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337293.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/336988.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
            },
            {
              "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00",
              "refsource": "CONFIRM",
              "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-3027",
    "datePublished": "2009-12-11T16:00:00",
    "dateReserved": "2009-08-31T00:00:00",
    "dateUpdated": "2024-08-07T06:14:56.480Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}