var-200509-0196
Vulnerability from variot
Symantec AntiVirus Corporate Edition 9.0.1.x and 9.0.4.x, and possibly other versions, when obtaining updates from an internal LiveUpdate server, stores sensitive information in cleartext in the Log.Liveupdate log file, which allows attackers to obtain the username and password to the internal LiveUpdate server. Symantec LiveUpdate Client is susceptible to a local information disclosure vulnerability. A local attacker can subsequently access the file and disclose authentication credentials to access the server. This may lead to various attacks including the potential compromise of the server. Symantec Antivirus is an antivirus software produced by Symantec Corporation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200509-0196", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.4" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "liveupdate build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.734" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.4" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "liveupdate build", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "2.738" }, { "model": "liveupdate", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "2.6" }, { "model": "liveupdate", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "2.5" } ], "sources": [ { "db": "BID", "id": "14708" }, { "db": "NVD", "id": "CVE-2005-2766" }, { "db": "CNNVD", "id": "CNNVD-200509-026" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-2766" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovery is credited to \u003cgolovast@gmail.com\u003e.", "sources": [ { "db": "BID", "id": "14708" }, { "db": "CNNVD", "id": "CNNVD-200509-026" } ], "trust": 0.9 }, "cve": "CVE-2005-2766", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-13975", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-2766", "trust": 1.0, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-200509-026", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-13975", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-13975" }, { "db": "NVD", "id": "CVE-2005-2766" }, { "db": "CNNVD", "id": "CNNVD-200509-026" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec AntiVirus Corporate Edition 9.0.1.x and 9.0.4.x, and possibly other versions, when obtaining updates from an internal LiveUpdate server, stores sensitive information in cleartext in the Log.Liveupdate log file, which allows attackers to obtain the username and password to the internal LiveUpdate server. Symantec LiveUpdate Client is susceptible to a local information disclosure vulnerability. \nA local attacker can subsequently access the file and disclose authentication credentials to access the server. This may lead to various attacks including the potential compromise of the server. Symantec Antivirus is an antivirus software produced by Symantec Corporation", "sources": [ { "db": "NVD", "id": "CVE-2005-2766" }, { "db": "BID", "id": "14708" }, { "db": "VULHUB", "id": "VHN-13975" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2005-2766", "trust": 2.0 }, { "db": "BUGTRAQ", "id": "20050831 VULNERABILITY IN SYMANTEC ANTI VIRUS CORPORATE EDITION V9.X", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200509-026", "trust": 0.6 }, { "db": "BID", "id": "14708", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-13975", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-13975" }, { "db": "BID", "id": "14708" }, { "db": "NVD", "id": "CVE-2005-2766" }, { "db": "CNNVD", "id": "CNNVD-200509-026" } ] }, "id": "VAR-200509-0196", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-13975" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:58:32.168000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-2766" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=112552401413998\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=112552401413998\u0026w=2" }, { "trust": 0.3, "url": "http://securityresponse.symantec.com/avcenter/security/content/2005.09.02.html" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "/archive/1/409655" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=112552401413998\u0026amp;w=2" } ], "sources": [ { "db": "VULHUB", "id": "VHN-13975" }, { "db": "BID", "id": "14708" }, { "db": "NVD", "id": "CVE-2005-2766" }, { "db": "CNNVD", "id": "CNNVD-200509-026" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-13975" }, { "db": "BID", "id": "14708" }, { "db": "NVD", "id": "CVE-2005-2766" }, { "db": "CNNVD", "id": "CNNVD-200509-026" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-09-02T00:00:00", "db": "VULHUB", "id": "VHN-13975" }, { "date": "2005-08-31T00:00:00", "db": "BID", "id": "14708" }, { "date": "2005-09-02T10:03:00", "db": "NVD", "id": "CVE-2005-2766" }, { "date": "2005-09-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200509-026" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-18T00:00:00", "db": "VULHUB", "id": "VHN-13975" }, { "date": "2009-07-12T17:06:00", "db": "BID", "id": "14708" }, { "date": "2016-10-18T03:30:02.893000", "db": "NVD", "id": "CVE-2005-2766" }, { "date": "2006-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200509-026" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "14708" }, { "db": "CNNVD", "id": "CNNVD-200509-026" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec AntiVirus Update Local Information Disclosure Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200509-026" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "14708" }, { "db": "CNNVD", "id": "CNNVD-200509-026" } ], "trust": 0.9 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.