CERTA-2007-AVI-248
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités découvertes dans les produits Symantec permettent à un utilisateur distant malintentionné de provoquer un déni de service, de contourner la politiquer de sécurité ou d'exécuter du code arbitraire.
Description
Une vulnérabilité dans le service Scheduler Service (VxSchedService.exe) peut être exploitée par un utilisateur malveillant pour contourner la politique de sécurité. Un individu peut exploiter cette vulnérabilité afin d'exécuter du code arbitraire à distance.
Une seconde vulnérabilité dans le service Veritas Volume Replicator permet à une personne malintentionnée de provoquer l'arrêt brutal du service à distance ou, dans certaines circonstances, de consommer toutes les ressources du système.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Symantec | N/A | Symantec Veritas Storage Foundation for Database 4.x ; | ||
| Symantec | N/A | Symantec Veritas Storage Foundation 5.x ; | ||
| Symantec | N/A | Symantec Veritas Storage Foundation Cluster File System 4.x ; | ||
| Symantec | N/A | Symantec Veritas Storage Foundation for Oracle Real Application Clusters 4.x ; | ||
| Symantec | N/A | Symantec Veritas Storage Foundation 4.x ; | ||
| Symantec | N/A | Symantec Veritas Volume Manager 3.x. |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Symantec Veritas Storage Foundation for Database 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Symantec Veritas Storage Foundation 5.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Symantec Veritas Storage Foundation Cluster File System 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Symantec Veritas Storage Foundation for Oracle Real Application Clusters 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Symantec Veritas Storage Foundation 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Symantec Veritas Volume Manager 3.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 dans le service Scheduler Service (VxSchedService.exe)\npeut \u00eatre exploit\u00e9e par un utilisateur malveillant pour contourner la\npolitique de s\u00e9curit\u00e9. Un individu peut exploiter cette vuln\u00e9rabilit\u00e9\nafin d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\nUne seconde vuln\u00e9rabilit\u00e9 dans le service Veritas Volume Replicator\npermet \u00e0 une personne malintentionn\u00e9e de provoquer l\u0027arr\u00eat brutal du\nservice \u00e0 distance ou, dans certaines circonstances, de consommer toutes\nles ressources du syst\u00e8me.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2279",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2279"
},
{
"name": "CVE-2007-1593",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1593"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Symantec SYM07-010 du 01 juin 2007 :",
"url": "http://www.symantec.com/avcenter/security/Content/2007.06.01a.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Symantec SYM07-009 du 01 juin 2007 :",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.06.01.html"
}
],
"reference": "CERTA-2007-AVI-248",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-06-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits Symantec permettent \u00e0\nun utilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni de service,\nde contourner la politiquer de s\u00e9curit\u00e9 ou d\u0027ex\u00e9cuter du code\narbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Symantec Veritas Storage",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Symantec SYM07-009 du 01 juin 2007",
"url": null
},
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Symantec SYM07-010 du 01 juin 2007",
"url": null
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.