Skip to main content

Symantec Products Intel Alert Management System Vulnerabilities

Last Update Date: 1 Feb 2011 Release Date: 28 Jan 2011 6313 Views

RISK: Medium Risk

TYPE: Servers - Other Servers

TYPE: Other Servers

Multiple vulnerabilities have been identified in various Symantec products, which could be exploited by remote attackers or malicious users to cause a denial of service or take complete control of a vulnerable system. These issues are caused by buffer overflow and input validation errors in the Intel Alert Management System (AMS2) when processing user-supplied packets, which could allow attackers or malicious users to trigger arbitrary events (launching a program, sending an email), shutdown the service, or execute arbitray code.


Impact

  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • Symantec AntiVirus Corporate Edition Server (SAVCE) versions 10.x
  • Symantec Systems Center (SSC) versions 10.x
  • Symantec Quarantine Server version 3.6
  • Symantec Quarantine Server version 3.5

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Symantec AntiVirus Corporate Edition Server
    Upgrade to SAVCE 10.1 MR10

  • Symantec System Center
    Upgrade to SSC from SAVCE 10.1 MR10

  • Symantec Quarantine Server
    Upgrade to Quarantine Server from SEP 11.0 MR3 or later

  • Symantec Quarantine Server
    Upgrade to Quarantine Server from SAVCE 10.1 MR10


Vulnerability Identifier


Source


Related Link