FKIE_CVE-2010-0106

Vulnerability from fkie_nvd - Published: 2010-02-19 17:30 - Updated: 2025-04-11 00:51
Severity ?
Summary
The on-demand scanning in Symantec AntiVirus 10.0.x and 10.1.x before MR9, AntiVirus 10.2.x, and Client Security 3.0.x and 3.1.x before MR9, when Tamper protection is disabled, allows remote attackers to cause a denial of service (prevention of on-demand scanning) via "specific events" that prevent the user from having read access to unspecified resources.
Impacted products
Vendor Product Version
symantec antivirus 10.0
symantec antivirus 10.0.1
symantec antivirus 10.0.1.1
symantec antivirus 10.0.2
symantec antivirus 10.0.2.1
symantec antivirus 10.0.2.2
symantec antivirus 10.0.3
symantec antivirus 10.0.4
symantec antivirus 10.0.5
symantec antivirus 10.0.6
symantec antivirus 10.0.7
symantec antivirus 10.0.8
symantec antivirus 10.0.9
symantec antivirus 10.1
symantec antivirus 10.1
symantec antivirus 10.1
symantec antivirus 10.1
symantec antivirus 10.1
symantec antivirus 10.1
symantec antivirus 10.1.0.1
symantec antivirus 10.1.4
symantec antivirus 10.1.4.1
symantec antivirus 10.1.5
symantec antivirus 10.1.5.1
symantec antivirus 10.1.6
symantec antivirus 10.1.6.1
symantec antivirus 10.1.7
symantec antivirus 10.2
symantec antivirus 10.2
symantec antivirus 10.2
symantec client_security 3.0
symantec client_security 3.0
symantec client_security 3.0
symantec client_security 3.0.0.359
symantec client_security 3.0.1.1000
symantec client_security 3.0.1.1007
symantec client_security 3.0.1.1008
symantec client_security 3.0.2
symantec client_security 3.0.2.2000
symantec client_security 3.0.2.2001
symantec client_security 3.0.2.2010
symantec client_security 3.0.2.2011
symantec client_security 3.0.2.2020
symantec client_security 3.0.2.2021
symantec client_security 3.1
symantec client_security 3.1
symantec client_security 3.1
symantec client_security 3.1
symantec client_security 3.1.0.396
symantec client_security 3.1.0.401
symantec client_security 3.1.394
symantec client_security 3.1.400
symantec client_security 3.1.401
symantec endpoint_protection 11.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02FE2FB-514A-48F9-8833-B1EF4CC1E27E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BD10A73-3DEF-48BD-9B35-D2BF791560E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "03684DB6-9DC6-4EDD-902F-D1EC160330ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D38110-4B50-472E-9743-52A137F2ED93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1004A37-D22B-4690-8625-B631595C8B0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE7A5EDA-F1FF-4F66-BC78-DC6429D301CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A664090-5993-4DF2-AD6B-0F4867DB98B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "079D24C8-27D6-4794-8E56-58A7885DFE87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "732CB44D-7468-486A-85CA-FA1365DB0F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E236C99A-D524-462A-BD8E-97A07B3BFC69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "37456791-164A-489B-A905-8B61C6F91BAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39155B8-55BD-4B58-85DB-505876930A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "287B278D-A114-4795-8934-64E3C4472481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C311B10-D660-4F50-828D-6D2CDBE550BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1:*:corporate:*:*:*:*:*",
              "matchCriteriaId": "09C311A9-7F82-46C1-8A69-49C2890B1CFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1:mp1:corporate:*:*:*:*:*",
              "matchCriteriaId": "9ADCB5F2-CCE8-4123-8E7E-EAF4885FD482",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1:mr4:corporate:*:*:*:*:*",
              "matchCriteriaId": "6110CF45-3C3D-4560-A8F3-A5C47CD5265F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1:mr5:corporate:*:*:*:*:*",
              "matchCriteriaId": "D1F6FC33-2929-45A3-9AD1-057456EC366E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1:mr7:corporate:*:*:*:*:*",
              "matchCriteriaId": "B24D11E4-5927-4C3D-BBEB-21DC2990122F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1.0.1:*:corporate:*:*:*:*:*",
              "matchCriteriaId": "519B2E1C-FF02-4A40-804F-BCCB2B6CB57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1.4:*:corporate:*:*:*:*:*",
              "matchCriteriaId": "6DF07665-8AC8-405F-AF51-216C7A6F0ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1.4.1:*:corporate:*:*:*:*:*",
              "matchCriteriaId": "3CF7C8DB-1045-4226-9576-063A8A95518F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1.5:*:corporate:*:*:*:*:*",
              "matchCriteriaId": "DCC51E7C-9D45-4B95-95B1-2105F6812620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1.5.1:*:corporate:*:*:*:*:*",
              "matchCriteriaId": "A243CF7B-193D-481D-8518-5F711064D9B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1.6:*:corporate:*:*:*:*:*",
              "matchCriteriaId": "E7F8ED8F-E857-4290-844A-8F1ADE383C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1.6.1:*:corporate:*:*:*:*:*",
              "matchCriteriaId": "BCFA7D6F-103F-49DD-93AD-9C19AAE44BFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.1.7:*:corporate:*:*:*:*:*",
              "matchCriteriaId": "D1C41837-80A2-48A4-A093-EC6478120216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.2:*:corporate:*:*:*:*:*",
              "matchCriteriaId": "94E10F15-5F41-4B6B-9C42-7ED34E8420C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.2:mr2:corporate:*:*:*:*:*",
              "matchCriteriaId": "8F35EA2A-B446-446F-8FDE-1C09D9A73687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus:10.2:mr3:corporate:*:*:*:*:*",
              "matchCriteriaId": "782569C8-2244-4B8C-9D8E-0C37456278F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0:mr1:*:*:*:*:*:*",
              "matchCriteriaId": "6D4A3BB0-C293-47D5-AC66-4AFAEC45EFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0:mr2:*:*:*:*:*:*",
              "matchCriteriaId": "120CD307-806A-45A8-9DCF-D23FEE072432",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB1C90D-DBC0-4DA0-AF5D-E42C41E84B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "2852548A-39A6-44FB-A73E-96507BA0CD8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*",
              "matchCriteriaId": "17862D7F-7001-46B8-A415-2A15A247E9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*",
              "matchCriteriaId": "170AEE7B-31AF-44E2-9B63-9703D0DE721C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "56EA0BAC-ED6D-45D2-995C-18B828906E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*",
              "matchCriteriaId": "63B1A9FC-707C-4F6F-959B-30B28E43D202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E4E013-A819-42E0-8F8E-9B2D409F900E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EBD7767-C352-435B-8963-83F723FFD302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2FC1708-B643-4489-A59C-EBDAFD9B0078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCE0C8A-A97C-4DE1-B0EE-3A2D16A34C77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE714705-CEE9-4BA1-8573-FD3765BC7F94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1:mr4:*:*:*:*:*:*",
              "matchCriteriaId": "CD25A172-D70C-44E0-9551-F390AF0AD8A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1:mr5:*:*:*:*:*:*",
              "matchCriteriaId": "8FB89648-5727-4F8F-83B7-3E11CE69EA3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1:mr7:*:*:*:*:*:*",
              "matchCriteriaId": "589E62A1-067B-4220-9959-03367E5E014F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.0.396:*:*:*:*:*:*:*",
              "matchCriteriaId": "17110872-8BD5-4CB0-9F2A-B18D091A7EC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.0.401:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D29AD07-6545-4180-8E32-C18586684845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6090F86-0B42-403F-9996-9B7670EBAA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF555313-BB5A-4D8A-A3A1-609ABC39F6FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC74372F-329A-4597-810B-88B865771C9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E269D396-3A70-4C4B-9D79-CBBA75C280D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The on-demand scanning in Symantec AntiVirus 10.0.x and 10.1.x before MR9, AntiVirus 10.2.x, and Client Security 3.0.x and 3.1.x before MR9, when Tamper protection is disabled, allows remote attackers to cause a denial of service (prevention of on-demand scanning) via \"specific events\" that prevent the user from having read access to unspecified resources."
    },
    {
      "lang": "es",
      "value": "El escaneo bajo demanda en Symantec AntiVirus v10.0.x y v10.1.x anterior a MR9, AntiVirus v10.2.x, Client Security v3.0.x y v3.1.x anterior a MR9 y Endpoint Protection v11.x, cuando la protecci\u00f3n de manipulaci\u00f3n est\u00e1 desactivado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (prevenci\u00f3n de escaneo bajo demanda) a trav\u00e9s de \"eventos concretos\" que impiden que el usuario tenga acceso de lectura a recursos no especificados."
    }
  ],
  "id": "CVE-2010-0106",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 1.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-02-19T17:30:00.660",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/62414"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38653"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/38219"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1023621"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100217_00"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0410"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56354"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/62414"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/38219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1023621"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100217_00"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0410"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56354"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…